{"id":11972,"date":"2018-10-12T05:22:05","date_gmt":"2018-10-12T09:22:05","guid":{"rendered":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/"},"modified":"2024-06-13T19:58:41","modified_gmt":"2024-06-13T23:58:41","slug":"el-correo-electronico-y-la-votacion-por-internet-una-amenaza-olvidada-para-la-seguridad-electoral","status":"publish","type":"resource","link":"https:\/\/www.commoncause.org\/es\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","title":{"rendered":"Votaci\u00f3n por correo electr\u00f3nico e Internet: la amenaza ignorada a la seguridad electoral"},"template":"","class_list":["post-11972","resource","type-resource","status-publish","hentry","resource_type-report"],"acf":{"details":{"summary":"Federal government, military and private sector studies have examined the feasibility of internet-based voting and have concluded it is not secure and should not be used in U.S. government elections.","featured_image":"","resource_type":150,"authors":"","related_issues":[143,2066],"related_work":false,"location":46},"sidebar":{"helper_enable_sidebar":false,"helper_media_contact":{"heading":"Media Contact","manually_enter_person":false,"person":"","name":"","role":"","phone":"","email":""},"helper_links_downloads":{"heading":"Links & Downloads","links":null}},"page_layout":[{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<a class=\"button1\" role=\"button\" target=\"_blank\" href=\"https:\/\/www.commoncause.org\/es\/electionsecurityreport\/\">read Download the Full Report: \" Email and Internet Voting: The Overlooked Threat to Election Security\"<\/a>"}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">Resumen ejecutivo<\/span><\/h2>\r\nOver the past two years, revelations that our election systems have been targeted for cyberattack have roiled the U.S. Leaders of our national security apparatus have repeatedly warned that our election infrastructure continues to be targeted for online attacks by foreign intelligence. As state election officials grapple with the looming threat of cyberattack on election technology, there is a significant vulnerability that has been roundly ignored: transmission of ballots over the internet, including by email, fax and blockchain systems.\r\n\r\nThis report reviews the research that has been conducted by the federal government concluding that secure\r\nonline voting is not yet feasible. We examine the insoluble security problems that are inherent to casting ballots online, including server penetration attacks, client-device malware, attacks to emailed and faxed ballots in transit, denial-of-service attacks, disruption attacks and the challenge to reliably authenticate voters.\r\n\r\nThe report foregrounds a serious, yet widely overlooked cybersecurity threat to state and county election infrastructure that receive ballots sent as attachments in the form of emails or digital faxes. In jurisdictions that receive ballots by PDF or JPEG attachment, election workers must routinely click on documents from unknown sources to process emailed or faxed ballots, exposing the computer receiving the ballots \u2014 and any other devices on the same network \u2014 to a host of cyberattacks that could be launched from a false ballot laden with malicious software. An infected false ballot would enter the server like any other ballot, but once opened, it would download malware that could give attackers backdoor access to the elections office\u2019s network.\r\n\r\nA review of publications on security best practices from the U.S. Election Assistance Commission (EAC), the Department of Homeland Security (DHS) and the National Association of Election Officials found no published guidance regarding the security of emailed ballots or recommendations for securing a computer terminal receiving emailed ballots.\r\n<h3><span style=\"color: #3366ff;\">Recomendaciones:<\/span><\/h3>\r\n<ul>\r\n \t<li>Estudios realizados por el gobierno federal, el ej\u00e9rcito y el sector privado han examinado la viabilidad de la votaci\u00f3n por Internet y han concluido que no es segura y no deber\u00eda utilizarse en las elecciones del gobierno de Estados Unidos.<\/li>\r\n \t<li>Treinta y dos estados permiten la votaci\u00f3n en l\u00ednea para alg\u00fan subconjunto de votantes.<\/li>\r\n \t<li>En las elecciones generales de 2016, se inform\u00f3 de que se hab\u00edan emitido m\u00e1s de 100.000 votos en l\u00ednea, seg\u00fan los datos recopilados en la Encuesta sobre administraci\u00f3n y votaci\u00f3n de la EAC. Es probable que la cifra real sea mucho mayor.<\/li>\r\n \t<li>Las agencias federales que apoyan a los estados a mejorar la seguridad de sus elecciones no han emitido ninguna advertencia sobre la devoluci\u00f3n en l\u00ednea de las papeletas votadas.<\/li>\r\n \t<li>Las papeletas devueltas en l\u00ednea pueden ser alteradas de forma imperceptible por una variedad de ciberataques, incluidos programas maliciosos instalados en el ordenador del usuario y ataques de penetraci\u00f3n del servidor. Esto \u00faltimo se ha demostrado en vivo y en una elecci\u00f3n de \u201cprueba\u201d.<\/li>\r\n \t<li>La votaci\u00f3n por Internet ampl\u00eda las posibilidades de que un atacante realice ataques da\u00f1inos de interrupci\u00f3n y denegaci\u00f3n de servicio, destinados a desactivar el sistema, prohibir a los votantes emitir su voto y socavar la confianza de los votantes en las elecciones.<\/li>\r\n \t<li>Recibir boletas como archivos adjuntos tambi\u00e9n puede exponer el sistema electoral de un estado o condado a ataques sist\u00e9micos. Los atacantes sofisticados pueden falsificar los correos electr\u00f3nicos de un votante leg\u00edtimo y usar boletas falsas para enviar malware que se puede usar para ingresar a la infraestructura electoral del condado o estado.<\/li>\r\n \t<li>Las nuevas tecnolog\u00edas, incluida la cadena de bloques, no resuelven los problemas de seguridad insolubles inherentes a la votaci\u00f3n en l\u00ednea, como los ataques de penetraci\u00f3n en servidores, el malware en dispositivos cliente, los ataques de denegaci\u00f3n de servicio y los ataques de interrupci\u00f3n.<\/li>\r\n<\/ul>"}},{"acf_fc_layout":"layout_image","_acfe_flexible_toggle":"","component_image":{"image":4949,"width":"medium"}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">Conclusi\u00f3n<\/span><\/h2>\r\nUntil there is a major technological breakthrough in or fundamental change to the nature of the internet, the best method for securing elections is a tried-and-true one: mailed paper ballots. Paper ballots are not tamper-proof, but they are not vulnerable to the same wholesale fraud or manipulation associated with internet voting. Tampering with mailed paper ballots is a one-at-a-time attack. Infecting voters\u2019 computers with malware or infecting the computers in the elections office that handle and count ballots are both effective methods for large-scale corruption.\r\n\r\nMilitary voters undoubtedly face greater obstacles in casting their ballots. They deserve any help the government can give them to participate in democracy equally with all other citizens. However, in this threat-filled environment, online voting endangers the very democracy the U.S. military is charged with protecting.\r\n\r\nConsidering current technology and current threats, postal return of a voted ballot is the most responsible option. States that permit online return of voted ballots should suspend the practice. Federal agencies such as DHS and EAC should acknowledge the vulnerabilities introduced by permitting online voting and recommend that states curtail all online ballot return. Until they do, the integrity of Americans\u2019 votes are at stake, and in many cases, the integrity of the election system is at risk."}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">Summary Recommendations<\/span><\/h2>\r\nWe recommend some basic precautions that election officials and voters should follow. [A comprehensive set of recommendations is at the end of this report.]\r\n\r\nRecommendations for election administrators:\r\n<ul>\r\n \t<li>Map the network to ensure that the computer used to receive emailed or digitally faxed ballots is <em>not <\/em>connect- ed to or on the same network as the voting machine network, election management system (EMS) or voter registration system through the wired or wireless means.<\/li>\r\n \t<li>Scan all incoming email and digital attachments formalware. The mail program should be configured to verify that attachments are of the expected type and fall into the typical size range. <strong>Important<\/strong>: Scanning may find attachments for executable malware programs but may be unable to detect malware <em>inside <\/em>a PDF or JPEG file. Malware inside such files is much more complex.<\/li>\r\n \t<li>Ensure all ballots returned by electronic means are printed for counting and not electronically transmitted to the EMS for tallying.<\/li>\r\n \t<li>Provide all voters with information and options for mailing ballots back by postal mail.<\/li>\r\n \t<li>Ensure military voters are aware of the free expedited postal mail option available to them. Recommendations for voters:<\/li>\r\n \t<li>Voters who receive blank ballots in the mail are encouraged to mark the ballots and mail them back.<\/li>\r\n \t<li>Voters who receive blank ballots by email are encouraged to print out the ballot and mark it by hand if possible. If marking the ballot using a computer, print out the final version and carefully review the choices before mailing it back.<\/li>\r\n \t<li>Send the ballot back by postal mail. Military personnel in army, fleet or diplomatic post office (APO\/FPO\/ DPO) locations can return absentee ballots via Priority Mail Express using the free Express Mail Label 11-DOD.<\/li>\r\n<\/ul>\r\nAfter the 2018 general election, states that permit online return of voted ballots should eliminate the practice. This will require legislative action in most states. While imposing a quarantine on incoming ballots is helpful, that will by no means stop a sophisticated attacker from attempting to use ballots in a spear phishing attack or corrupting ballots in transit. Additionally, federal agencies charged with assisting states in strengthening their election security should exercise leadership and publish warnings regarding the online return of voted ballots."}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<a class=\"button1\" role=\"button\" target=\"_blank\" href=\"https:\/\/www.commoncause.org\/es\/electionsecurityreport\/\">read Download the Full Report: \" Email and Internet Voting: The Overlooked Threat to Election Security\"<\/a>"}},{"acf_fc_layout":"layout_add_component","_acfe_flexible_toggle":"","component_add_component":null},{"acf_fc_layout":"layout_work","_acfe_flexible_toggle":"","component_work":{"heading":"Work","manually_curate":false,"work":null}},{"acf_fc_layout":"layout_resources","_acfe_flexible_toggle":"","component_resources":{"heading":"Related Resources","button_text":"See all Related Resources","manually_curate":false,"resource":null}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commoncause.org\/es\/recursos-2\/el-correo-electronico-y-la-votacion-por-internet-una-amenaza-olvidada-para-la-seguridad-electoral\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email and Internet Voting: The Overlooked Threat to Election Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commoncause.org\/es\/recursos-2\/el-correo-electronico-y-la-votacion-por-internet-una-amenaza-olvidada-para-la-seguridad-electoral\/\" \/>\n<meta property=\"og:site_name\" content=\"Common Cause\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommonCause\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T23:58:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CommonCause\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\",\"url\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\",\"name\":\"Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause\",\"isPartOf\":{\"@id\":\"https:\/\/www.commoncause.org\/#website\"},\"datePublished\":\"2018-10-12T09:22:05+00:00\",\"dateModified\":\"2024-06-13T23:58:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.commoncause.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email and Internet Voting: The Overlooked Threat to Election Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.commoncause.org\/#website\",\"url\":\"https:\/\/www.commoncause.org\/\",\"name\":\"Common Cause\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.commoncause.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.commoncause.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.commoncause.org\/#organization\",\"name\":\"Common Cause\",\"url\":\"https:\/\/www.commoncause.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"contentUrl\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"width\":2066,\"height\":331,\"caption\":\"Common Cause\"},\"image\":{\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CommonCause\",\"https:\/\/x.com\/CommonCause\",\"https:\/\/www.instagram.com\/ourcommoncause\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Votaci\u00f3n por correo electr\u00f3nico e Internet: la amenaza ignorada a la seguridad electoral - Common Cause","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commoncause.org\/es\/recursos-2\/el-correo-electronico-y-la-votacion-por-internet-una-amenaza-olvidada-para-la-seguridad-electoral\/","og_locale":"es_MX","og_type":"article","og_title":"Email and Internet Voting: The Overlooked Threat to Election Security","og_url":"https:\/\/www.commoncause.org\/es\/recursos-2\/el-correo-electronico-y-la-votacion-por-internet-una-amenaza-olvidada-para-la-seguridad-electoral\/","og_site_name":"Common Cause","article_publisher":"https:\/\/www.facebook.com\/CommonCause","article_modified_time":"2024-06-13T23:58:41+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CommonCause","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","url":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","name":"Votaci\u00f3n por correo electr\u00f3nico e Internet: la amenaza ignorada a la seguridad electoral - Common Cause","isPartOf":{"@id":"https:\/\/www.commoncause.org\/#website"},"datePublished":"2018-10-12T09:22:05+00:00","dateModified":"2024-06-13T23:58:41+00:00","breadcrumb":{"@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commoncause.org\/"},{"@type":"ListItem","position":2,"name":"Email and Internet Voting: The Overlooked Threat to Election Security"}]},{"@type":"WebSite","@id":"https:\/\/www.commoncause.org\/#website","url":"https:\/\/www.commoncause.org\/","name":"Causa com\u00fan","description":"","publisher":{"@id":"https:\/\/www.commoncause.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.commoncause.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.commoncause.org\/#organization","name":"Causa com\u00fan","url":"https:\/\/www.commoncause.org\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","contentUrl":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","width":2066,"height":331,"caption":"Common Cause"},"image":{"@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommonCause","https:\/\/x.com\/CommonCause","https:\/\/www.instagram.com\/ourcommoncause\/"]}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Common Cause","distributor_original_site_url":"https:\/\/www.commoncause.org\/es","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/resource\/11972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":1,"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/resource\/11972\/revisions"}],"predecessor-version":[{"id":20010,"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/resource\/11972\/revisions\/20010"}],"wp:attachment":[{"href":"https:\/\/www.commoncause.org\/es\/wp-json\/wp\/v2\/media?parent=11972"}],"curies":[{"name":"Gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}