Cyberattack on Florida election is first known attempt

Experts analyzing last year's election found rejected "phantom requests" for absentee ballots

Topics: Cyberattack, absentee ballot, voting, Florida, 2012 Elections, ,

Cyberattack on Florida election is first known attempt (Credit: Shutterstock/ mtkang)

In what experts have called the first reported attempt to cyberattack a U.S. election, more than 2,500 “phantom requests” for absentee ballots were sent to Miami-Dade County elections website according to a grand jury report flagged by NBC News Monday.

All the requests were detected and rejected, but the incident has nonetheless raised concerns about cyberthreats to online voting systems. The improper requests came from a small number of computer IP addresses overseas, which drew the attention of election workers. As NBC noted, “it is not clear whether the bogus requests were an attempt to influence a specific race, test the system or simply interfere with the voting.” The originators of the phantom requests could not be traced, the grand jury report noted, as they used proxy servers that make Internet activity untraceable.

NBC noted that while there have been allegations of U.S. election system rigging in the past, experts believe this incident to be the first (although long-anticipated) documented cyberattack attempt. Via NBC:



“It’s the first documented attack I know of on an online U.S. election-related system that’s not (involving) a mock election,” said David Jefferson, a computer scientist at Lawrence Livermore National Laboratory who is on the board of directors of the Verified Voting Foundation and the California Voter Foundation.

Other experts contacted by NBC News agreed that the attempt to obtain the ballots is the first known case of a cyberattack on voting, though they noted that there are so many local elections systems in use that it’s possible that a similar attempt has gone unnoticed.

There have been allegations of election system hacking before in the U.S., but investigations of irregularities have found only software glitches, voting machine failures, voter error or inconclusive evidence. Where there has been evidence of a computer security breach — such as a 2006 incident in Sarasota, Fla., in which  a computer worm that had been around for years raised havoc with the county elections voter database — it was unclear whether the worm’s appearance was timed to interfere with the election.

In any case, experts say they’ve been warning about this sort of attack for years.

Natasha Lennard

Natasha Lennard is an assistant news editor at Salon, covering non-electoral politics, general news and rabble-rousing. Follow her on Twitter @natashalennard, email nlennard@salon.com.

More Related Stories

Featured Slide Shows

  • Share on Twitter
  • Share on Facebook
  • 1 of 10
  • Close
  • Fullscreen
  • Thumbnails

    Romance novels need a canon

    "Bet Me" by Jennifer Crusie

    A contemporary romantic comedy set to Elvis Costello and lots of luxurious and sinful sugary treats.   Read the whole essay.

    Romance novels need a canon

    "Welcome to Temptation" by Jennifer Crusie

    Another of Crusie's romantic comedies, this one in the shadow of an ostentatiously phallic water tower.   Read the whole essay.

    Romance novels need a canon

    "A Gentleman Undone" by Cecilia Grant

    A Regency romance with beautifully broken people and some seriously steamy sex.   Read the whole essay.

    Romance novels need a canon

    "Black Silk" by Judith Ivory

    A beautifully written, exquisitely slow-building Regency; the plot is centered on a box with some very curious images, as Edward Gorey might say.   Read the whole essay.

    Romance novels need a canon

    "For My Lady's Heart" by Laura Kinsale

    A medieval romance, the period piece functions much like a dystopia, with the courageous lady and noble knight struggling to find happiness despite the authoritarian society.   Read the whole essay.

    Romance novels need a canon

    "Sweet Disorder" by Rose Lerner

    A Regency that uses the limitations on women of the time to good effect; the main character is poor and needs to sell her vote ... or rather her husband's vote. But to sell it, she needs to get a husband first ...   Read the whole essay.

    Romance novels need a canon

    "Frenemy of the People" by Nora Olsen

    Clarissa is sitting at an awards banquet when she suddenly realizes she likes pictures of Kimye for both Kim and Kanye and she is totally bi. So she texts to all her friends, "I am totally bi!" Drama and romance ensue ... but not quite with who she expects. I got an advanced copy of this YA lesbian romance, and I’d urge folks to reserve a copy; it’s a delight.   Read the whole essay.

    Romance novels need a canon

    "The Slightest Provocation" by Pam Rosenthal

    A separated couple works to reconcile against a background of political intrigue; sort of "His Gal Friday" as a spy novel set in the Regency.   Read the whole essay.

    Romance novels need a canon

    "Again" by Kathleen Gilles Seidel

    Set among workers on a period soap opera, it manages to be contemporary and historical both at the same time.   Read the whole essay.

  • Recent Slide Shows

Comments

0 Comments

Comment Preview

Your name will appear as username ( settings | log out )

You may use these HTML tags and attributes: <a href=""> <b> <em> <strong> <i> <blockquote>