{"id":19879,"date":"2020-03-06T01:14:59","date_gmt":"2020-03-06T01:14:59","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=19879"},"modified":"2020-03-07T14:13:20","modified_gmt":"2020-03-07T14:13:20","slug":"internet-of-things-could-be-an-unseen-threat-to-elections","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/internet-of-things-could-be-an-unseen-threat-to-elections\/","title":{"rendered":"&#8216;Internet of things&#8217; could be an unseen threat to elections"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/laura-denardis-971364\">Laura DeNardis<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/american-university-school-of-communication-2885\">American University School of Communication<\/a><\/em><\/p>\n<p>The app failure that led to a chaotic <a href=\"https:\/\/www.cnbc.com\/2020\/02\/04\/iowa-caucus-app-debacle-is-one-of-the-most-stunning-it-failures-ever.html\">2020 Iowa caucus<\/a> was a reminder of how vulnerable the democratic process is to technological problems \u2013 even without any malicious outside intervention. Far more sophisticated foreign hacking continues to try to disrupt democracy, as a <a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/joint-statement-from-dos-doj-dod-dhs-odni-fbi-nsa-and-cisa-on-preparations-for-super-tuesday\">rare joint federal agency warning<\/a> advised prior to Super Tuesday. Russia\u2019s attempt to <a href=\"https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/Report_Volume1.pdf\">interfere in the 2016 election<\/a> has already revealed how this could happen: social media disinformation, email hacking and probing of voter registration systems.<\/p>\n<p>The threats to the 2020 election may be even more insidious. As I explain in my new book, \u201c<a href=\"https:\/\/yalebooks.yale.edu\/book\/9780300233070\/internet-everything\">The Internet in Everything: Freedom and Security in a World with No Off Switch<\/a>,\u201d election interference may well come through the vast constellation of always-on, always-connected cameras, thermostats, alarm systems and other physical objects collectively known as the \u201cinternet of things.\u201d<\/p>\n<p>The social and economic benefits of these devices are tremendous. But, in large part because the devices are not yet adequately secure, they also raise concerns for consumer safety, national security and privacy. And they create new vulnerabilities for democracy.<\/p>\n<p>It is not necessary to hack into voting systems themselves but merely co-opt internet-connected objects to attack political information sites, stop people from voting, or exploit the intimate personal data these devices capture to manipulate voters.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=337&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=337&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=337&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/317457\/original\/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">How will people get information now?<\/span><br \/>\n<span class=\"attribution\"><span class=\"source\">Twitter<\/span><\/span><\/figcaption><\/figure>\n<h2>Disrupting political communication<\/h2>\n<p>Connected objects have already been hijacked to shut down internet traffic.<\/p>\n<p>The <a href=\"https:\/\/www.wired.com\/story\/mirai-botnet-minecraft-scam-brought-down-the-internet\/\">Mirai botnet<\/a> of 2016 hijacked insecure video cameras and other home devices to launch a massive \u201cdistributed denial of service\u201d attack that <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/10\/how-a-bunch-of-hacked-dvr-machines-took-down-twitter-and-reddit\/505073\/\">blocked access to many popular sites<\/a>, including Reddit and Twitter. More recently, the FBI arrested a hacker for <a href=\"https:\/\/thehill.com\/homenews\/house\/484122-fbi-arrests-hacker-linked-to-former-rep-katie-hills-2018-campaign\">allegedly disrupting a California congressional candidate\u2019s website<\/a>, flooding it with so many false requests it became inaccessible for legitimate views.<\/p>\n<p>Similar political attacks that hijack some of the billions of often insecure connected devices could disrupt campaign websites and social media. They could also restrict public access to government websites with information about how and where to vote, as well as news reports on election results.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=316&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=316&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=316&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=397&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=397&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/317456\/original\/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=397&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">What if this traffic jam were caused by hacking the traffic light itself?<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/fort-lauderdale-florida-usa-may-traffic-1406298935\">Jillian Cain Photography\/Shutterstock.com<\/a><\/span><\/figcaption><\/figure>\n<h2>Preventing people from voting<\/h2>\n<p>Beyond blocking access to political information, a foreign agent or group might seek to stop people from voting by creating targeted chaos, whether by disrupting power systems, generating <a href=\"https:\/\/www.wired.com\/story\/99-phones-fake-google-maps-traffic-jam\/\">false weather or traffic reports<\/a>, or otherwise triggering local emergencies that divert attention on Election Day.<\/p>\n<p>Smart cities and the industrial internet of things are already targets, as evidenced by the yearslong history of <a href=\"https:\/\/www.us-cert.gov\/ics\/alerts\/IR-ALERT-H-16-056-01\">Russia-attributed disruptions to Ukrainian power systems<\/a>. Hacking home alarm or water systems could create <a href=\"https:\/\/www.king5.com\/article\/news\/local\/no-emergency-false-alert-over-radiological-incident-sent-by-jefferson-county\/281-568c86b3-8aae-4df0-b3b3-5dd4c800e0e8\">politically micro-targeted local emergencies<\/a> that distract people who would otherwise vote.<\/p>\n<p>This type of local disruption in swing districts would be more likely to evade public or press scrutiny than an outright hack of election machines or vote-tallying systems.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=445&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=445&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=445&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=559&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=559&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/317460\/original\/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=559&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><\/a><figcaption><span class=\"caption\">Your home security systems knows when you leave for work, and when you get back.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/pressing-code-on-house-alarm-100369859\">ESB Professional\/Shutterstock.com<\/a><\/span><\/figcaption><\/figure>\n<h2>Making phishing hacks more credible<\/h2>\n<p>The massive amount of intimate data these devices collect \u2013 when someone enters a building, drives a car, uses a sink, or turns on a coffee machine \u2013 could also make political operatives more susceptible to highly targeted spear <a href=\"https:\/\/theconversation.com\/spearphishing-roiled-the-presidential-campaign-heres-how-to-protect-yourself-68274\">phishing<\/a> attacks. These tactics trick people into relinquishing personal information or clicking on malicious links \u2013 mistakes that gave hackers access to <a href=\"https:\/\/techcrunch.com\/2019\/04\/18\/mueller-clinton-arizona-hack\/\">Democratic National Committee emails in 2016<\/a>.<\/p>\n<p>Similar <a href=\"https:\/\/www.cnn.com\/2020\/01\/22\/politics\/democratic-campaigns-targeted-scams\/index.html\">phishing attempts on political campaigns continue<\/a>, seeking to infiltrate email accounts used by presidential and down-ballot candidates. The more believable they are, <a href=\"https:\/\/www.rand.org\/blog\/2015\/10\/social-engineering-explained-the-human-element-in-cyberattacks.html\">the more effective they are<\/a> \u2013 so an email referencing personal facts gleaned from connected objects would make these attacks more potent.<\/p>\n<h2>Not being surprised again<\/h2>\n<p>More things than people are now connected to the internet. These connected objects are a new terrain for election interference \u2013 and people shouldn\u2019t be surprised if they\u2019re used that way.<\/p>\n<p>To address this over the long term, customers will have to demand better privacy and security from their connected devices, such as doorbells and <a href=\"https:\/\/www.usatoday.com\/story\/tech\/2020\/02\/05\/how-to-avoid-smart-lights-getting-hacked\/4660430002\/\">lightbulbs<\/a>. Companies \u2013 and political institutions \u2013 that connect these devices to their networks will have to build in appropriate safeguards. Manufacturers will also have to design better protections into their devices. There may also need to be data privacy <a href=\"https:\/\/theconversation.com\/fragmented-us-privacy-rules-leave-large-data-loopholes-for-facebook-and-others-94606\">laws limiting<\/a> how personal information is collected and shared.<\/p>\n<p>More immediately, though, it is essential not only for state and local authorities and intelligence communities to remain vigilant, but for citizens to <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/12\/31\/secure-new-internet-connected-devices\">take security precautions<\/a> with their own devices, and be on high alert for personalized attempts to influence or disrupt their political participation.<\/p>\n<p>Preserving democracy now requires taking seriously the consequences of the internet being deeply embedded in the physical world \u2013 the internet in everything. We are all responsible.<\/p>\n<p>[<em>You\u2019re smart and curious about the world. So are The Conversation\u2019s authors and editors.<\/em> <a href=\"https:\/\/theconversation.com\/us\/newsletters\/weekly-highlights-61?utm_source=TCUS&amp;utm_medium=inline-link&amp;utm_campaign=newsletter-text&amp;utm_content=weeklysmart\">You can get our highlights each weekend<\/a>.]<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/132142\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/laura-denardis-971364\">Laura DeNardis<\/a>, Professor of Communication Studies, <em><a href=\"https:\/\/theconversation.com\/institutions\/american-university-school-of-communication-2885\">American University School of Communication<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/internet-of-things-could-be-an-unseen-threat-to-elections-132142\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Laura DeNardis, American University School of Communication The app failure that led to a chaotic 2020 Iowa caucus was a reminder of how vulnerable the democratic process is to technological problems \u2013 even without any malicious outside intervention. Far more sophisticated foreign hacking continues to try to disrupt democracy, as a rare joint federal agency [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":19880,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[612,7756,5402,5400,613,7757,3109,3110,5404],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/19879"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=19879"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/19879\/revisions"}],"predecessor-version":[{"id":19886,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/19879\/revisions\/19886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/19880"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=19879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=19879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=19879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}