Author: Jeremy Epstein

  • Presidential Commission on Election reform – good news & bad

    In his State of the Union address, President Obama stated: “But defending our freedom is not the job of our military alone. We must all do our part to make sure our God-given rights are protected here at home. That includes our most fundamental right as citizens: the right to vote. When any Americans –…

  • Hacking newspapers vs. hacking elections

    The past few days have revealed that the New York Times, Wall Street Journal, and Washington Post have all been hacked by Chinese government-affiliated organizations, for the purpose of spying on reporters. The Washington Post says that the attacks were detected over a year ago, and had been going on for at least a year…

  • Report on the NSF "Secure and Trustworthy Cyberspace" PI meeting

    The National Science Foundation (NSF) Secure and Trustworthy Cyberspace (SaTC) Principal Investigator Meeting (whew!) took place Nov. 27-29, 2012, at the Gaylord Hotel just outside Washington, DC.  The SaTC program is NSF’s flagship for cybersecurity research, although it certainly isn’t the only NSF funding in this area.  The purpose of this blog posting is to…

  • What happens when responsible disclosure fails?

    The topic of how to handle security vulnerabilities has been discussed for years. Wikipedia defines responsible disclosure as: Responsible disclosure is a computer security term describing a vulnerability disclosure model. It is like full disclosure, with the addition that all stakeholders agree to allow a period of time for the vulnerability to be patched before…

  • Voting technology issues in Virginia on election day

    I spent Election Day in one of the command centers for the 866-OUR-VOTE hotline. The command center was accepting calls from New Jersey, Maryland, DC, and Virginia, but 95% of the technology issues were from Virginia. I was the designated “technology guy”, so pretty much everything that came through that center came to me. This…

  • Joisy on my mind

    Like everyone interested in the mechanics of elections, I’ve been fascinated by the New Jersey efforts to allow voters to request and submit ballots via email. In this posting, I’d like to address four brief points that I don’t think have received much attention – the first two policy, and the last two technical. First,…

  • Grading the absentee-in-person experience in Virginia

    [Each year, I write a “my day as a pollworker” report. This year, I’m not a pollworker, or election officer in Virginia parlance, for a variety of reasons, so I decided to write about my voting experience.] I just got back from “in-person absentee voting”. This is similar to but not the same as early…

  • Going to the doctor and worrying about cybersecurity

    For most people, going to the doctor means thinking about co-pays and when they’ll feel better. For me though, it means thinking about those plus the cyber security of the computer systems being used by the medical professionals. I’ve spent more time than usual visiting doctors recently. I broke my hand – sure I’ll tell…

  • DHS OIG study of scanners silent on computer threats

    The U.S. Department of Homeland Security Office of Inspector General (DHS OIG) released their report on safety of airport backscatter machines on February 29. The report has received criticism from ProPublica among others for what it says as well as what it doesn’t, mostly focusing on issues of incremental risk to the traveling public, the…

  • Who won the Iowa primary – and does it matter from a technical perspective?

    As Americans know, the 2012 presidential season began “officially” with the Iowa caucuses on January 3. I say “officially”, because caucuses are a strange beast that are a creation of political parties, and not government. Regardless, the Republican results were interesting – out of about 125,000 votes cast, Mitt Romney led by eight votes over…