{"id":11972,"date":"2018-10-12T05:22:05","date_gmt":"2018-10-12T09:22:05","guid":{"rendered":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/"},"modified":"2024-06-13T19:58:41","modified_gmt":"2024-06-13T23:58:41","slug":"bo-phieu-qua-email-va-internet-la-moi-de-doa-bi-bo-qua-doi-voi-an-ninh-bau-cu","status":"publish","type":"resource","link":"https:\/\/www.commoncause.org\/vi\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","title":{"rendered":"B\u1ecf phi\u1ebfu qua email v\u00e0 Internet: M\u1ed1i \u0111e d\u1ecda b\u1ecb b\u1ecf qua \u0111\u1ed1i v\u1edbi an ninh b\u1ea7u c\u1eed"},"template":"","class_list":["post-11972","resource","type-resource","status-publish","hentry","resource_type-report"],"acf":{"details":{"summary":"Federal government, military and private sector studies have examined the feasibility of internet-based voting and have concluded it is not secure and should not be used in U.S. government elections.","featured_image":"","resource_type":150,"authors":"","related_issues":[143,2066],"related_work":false,"location":46},"sidebar":{"helper_enable_sidebar":false,"helper_media_contact":{"heading":"Media Contact","manually_enter_person":false,"person":"","name":"","role":"","phone":"","email":""},"helper_links_downloads":{"heading":"Links & Downloads","links":null}},"page_layout":[{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<a class=\"button1\" role=\"button\" target=\"_blank\" href=\"https:\/\/www.commoncause.org\/vi\/electionsecurityreport\/\">read Download the Full Report: \" Email and Internet Voting: The Overlooked Threat to Election Security\"<\/a>"}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">T\u00f3m t\u1eaft n\u1ed9i dung<\/span><\/h2>\r\nOver the past two years, revelations that our election systems have been targeted for cyberattack have roiled the U.S. Leaders of our national security apparatus have repeatedly warned that our election infrastructure continues to be targeted for online attacks by foreign intelligence. As state election officials grapple with the looming threat of cyberattack on election technology, there is a significant vulnerability that has been roundly ignored: transmission of ballots over the internet, including by email, fax and blockchain systems.\r\n\r\nThis report reviews the research that has been conducted by the federal government concluding that secure\r\nonline voting is not yet feasible. We examine the insoluble security problems that are inherent to casting ballots online, including server penetration attacks, client-device malware, attacks to emailed and faxed ballots in transit, denial-of-service attacks, disruption attacks and the challenge to reliably authenticate voters.\r\n\r\nThe report foregrounds a serious, yet widely overlooked cybersecurity threat to state and county election infrastructure that receive ballots sent as attachments in the form of emails or digital faxes. In jurisdictions that receive ballots by PDF or JPEG attachment, election workers must routinely click on documents from unknown sources to process emailed or faxed ballots, exposing the computer receiving the ballots \u2014 and any other devices on the same network \u2014 to a host of cyberattacks that could be launched from a false ballot laden with malicious software. An infected false ballot would enter the server like any other ballot, but once opened, it would download malware that could give attackers backdoor access to the elections office\u2019s network.\r\n\r\nA review of publications on security best practices from the U.S. Election Assistance Commission (EAC), the Department of Homeland Security (DHS) and the National Association of Election Officials found no published guidance regarding the security of emailed ballots or recommendations for securing a computer terminal receiving emailed ballots.\r\n<h3><span style=\"color: #3366ff;\">K\u1ebft qu\u1ea3:<\/span><\/h3>\r\n<ul>\r\n \t<li>C\u00e1c nghi\u00ean c\u1ee9u c\u1ee7a ch\u00ednh ph\u1ee7 li\u00ean bang, qu\u00e2n \u0111\u1ed9i v\u00e0 khu v\u1ef1c t\u01b0 nh\u00e2n \u0111\u00e3 xem x\u00e9t t\u00ednh kh\u1ea3 thi c\u1ee7a vi\u1ec7c b\u1ecf phi\u1ebfu qua Internet v\u00e0 k\u1ebft lu\u1eadn r\u1eb1ng h\u00ecnh th\u1ee9c n\u00e0y kh\u00f4ng an to\u00e0n v\u00e0 kh\u00f4ng n\u00ean s\u1eed d\u1ee5ng trong c\u00e1c cu\u1ed9c b\u1ea7u c\u1eed c\u1ee7a ch\u00ednh ph\u1ee7 Hoa K\u1ef3.<\/li>\r\n \t<li>Ba m\u01b0\u01a1i hai ti\u1ec3u bang cho ph\u00e9p m\u1ed9t s\u1ed1 nh\u00f3m c\u1eed tri nh\u1ea5t \u0111\u1ecbnh b\u1ecf phi\u1ebfu tr\u1ef1c tuy\u1ebfn.<\/li>\r\n \t<li>Trong cu\u1ed9c t\u1ed5ng tuy\u1ec3n c\u1eed n\u0103m 2016, h\u01a1n 100.000 l\u00e1 phi\u1ebfu \u0111\u01b0\u1ee3c b\u00e1o c\u00e1o \u0111\u00e3 \u0111\u01b0\u1ee3c b\u1ecf tr\u1ef1c tuy\u1ebfn, theo d\u1eef li\u1ec7u thu th\u1eadp \u0111\u01b0\u1ee3c trong Kh\u1ea3o s\u00e1t B\u1ea7u c\u1eed v\u00e0 Qu\u1ea3n l\u00fd B\u1ea7u c\u1eed c\u1ee7a EAC. Con s\u1ed1 th\u1ef1c t\u1ebf c\u00f3 th\u1ec3 cao h\u01a1n nhi\u1ec1u.<\/li>\r\n \t<li>C\u00e1c c\u01a1 quan li\u00ean bang h\u1ed7 tr\u1ee3 c\u00e1c ti\u1ec3u bang c\u1ea3i thi\u1ec7n an ninh b\u1ea7u c\u1eed ch\u01b0a \u0111\u01b0a ra b\u1ea5t k\u1ef3 c\u1ea3nh b\u00e1o n\u00e0o li\u00ean quan \u0111\u1ebfn vi\u1ec7c tr\u1ea3 phi\u1ebfu b\u1ea7u tr\u1ef1c tuy\u1ebfn.<\/li>\r\n \t<li>Phi\u1ebfu b\u1ea7u \u0111\u01b0\u1ee3c tr\u1ea3 l\u1ea1i tr\u1ef1c tuy\u1ebfn c\u00f3 th\u1ec3 b\u1ecb thay \u0111\u1ed5i m\u00e0 kh\u00f4ng ph\u00e1t hi\u1ec7n \u0111\u01b0\u1ee3c b\u1eb1ng nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng, bao g\u1ed3m c\u1ea3 th\u00f4ng qua ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u00ean m\u00e1y t\u00ednh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u00e0 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng x\u00e2m nh\u1eadp m\u00e1y ch\u1ee7. \u0110i\u1ec1u sau \u0111\u00e3 \u0111\u01b0\u1ee3c ch\u1ee9ng minh tr\u1ef1c ti\u1ebfp v\u00e0 trong m\u1ed9t cu\u1ed9c b\u1ea7u c\u1eed &quot;th\u1eed nghi\u1ec7m&quot;.<\/li>\r\n \t<li>Vi\u1ec7c b\u1ecf phi\u1ebfu qua Internet m\u1edf r\u1ed9ng c\u01a1 h\u1ed9i cho k\u1ebb t\u1ea5n c\u00f4ng th\u1ef1c hi\u1ec7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng g\u00e2y gi\u00e1n \u0111o\u1ea1n v\u00e0 t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5, nh\u1eb1m m\u1ee5c \u0111\u00edch v\u00f4 hi\u1ec7u h\u00f3a h\u1ec7 th\u1ed1ng, c\u1ea5m c\u1eed tri b\u1ecf phi\u1ebfu v\u00e0 l\u00e0m suy y\u1ebfu l\u00f2ng tin c\u1ee7a c\u1eed tri v\u00e0o cu\u1ed9c b\u1ea7u c\u1eed.<\/li>\r\n \t<li>Vi\u1ec7c nh\u1eadn phi\u1ebfu b\u1ea7u d\u01b0\u1edbi d\u1ea1ng t\u1ec7p \u0111\u00ednh k\u00e8m c\u0169ng c\u00f3 th\u1ec3 khi\u1ebfn h\u1ec7 th\u1ed1ng b\u1ea7u c\u1eed c\u1ee7a ti\u1ec3u bang ho\u1eb7c qu\u1eadn b\u1ecb t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng b\u1ea7u c\u1eed. Nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng tinh vi c\u00f3 th\u1ec3 gi\u1ea3 m\u1ea1o email c\u1ee7a c\u1eed tri h\u1ee3p ph\u00e1p v\u00e0 s\u1eed d\u1ee5ng phi\u1ebfu b\u1ea7u gi\u1ea3 \u0111\u1ec3 ph\u00e1t t\u00e1n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 x\u00e2m nh\u1eadp v\u00e0o c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng b\u1ea7u c\u1eed c\u1ee7a qu\u1eadn ho\u1eb7c ti\u1ec3u bang.<\/li>\r\n \t<li>C\u00e1c c\u00f4ng ngh\u1ec7 m\u1edbi, bao g\u1ed3m blockchain, kh\u00f4ng gi\u1ea3i quy\u1ebft \u0111\u01b0\u1ee3c c\u00e1c v\u1ea5n \u0111\u1ec1 b\u1ea3o m\u1eadt kh\u00f4ng th\u1ec3 gi\u1ea3i quy\u1ebft \u0111\u01b0\u1ee3c v\u1ed1n c\u00f3 c\u1ee7a vi\u1ec7c b\u1ecf phi\u1ebfu tr\u1ef1c tuy\u1ebfn. C\u00e1c v\u1ea5n \u0111\u1ec1 n\u00e0y bao g\u1ed3m c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng x\u00e2m nh\u1eadp m\u00e1y ch\u1ee7, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u00ean thi\u1ebft b\u1ecb c\u1ee7a kh\u00e1ch h\u00e0ng, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 v\u00e0 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng g\u00e2y gi\u00e1n \u0111o\u1ea1n.<\/li>\r\n<\/ul>"}},{"acf_fc_layout":"layout_image","_acfe_flexible_toggle":"","component_image":{"image":4949,"width":"medium"}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">Ph\u1ea7n k\u1ebft lu\u1eadn<\/span><\/h2>\r\nUntil there is a major technological breakthrough in or fundamental change to the nature of the internet, the best method for securing elections is a tried-and-true one: mailed paper ballots. Paper ballots are not tamper-proof, but they are not vulnerable to the same wholesale fraud or manipulation associated with internet voting. Tampering with mailed paper ballots is a one-at-a-time attack. Infecting voters\u2019 computers with malware or infecting the computers in the elections office that handle and count ballots are both effective methods for large-scale corruption.\r\n\r\nMilitary voters undoubtedly face greater obstacles in casting their ballots. They deserve any help the government can give them to participate in democracy equally with all other citizens. However, in this threat-filled environment, online voting endangers the very democracy the U.S. military is charged with protecting.\r\n\r\nConsidering current technology and current threats, postal return of a voted ballot is the most responsible option. States that permit online return of voted ballots should suspend the practice. Federal agencies such as DHS and EAC should acknowledge the vulnerabilities introduced by permitting online voting and recommend that states curtail all online ballot return. Until they do, the integrity of Americans\u2019 votes are at stake, and in many cases, the integrity of the election system is at risk."}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<h2><span style=\"color: #3366ff;\">Summary Recommendations<\/span><\/h2>\r\nWe recommend some basic precautions that election officials and voters should follow. [A comprehensive set of recommendations is at the end of this report.]\r\n\r\nRecommendations for election administrators:\r\n<ul>\r\n \t<li>Map the network to ensure that the computer used to receive emailed or digitally faxed ballots is <em>not <\/em>connect- ed to or on the same network as the voting machine network, election management system (EMS) or voter registration system through the wired or wireless means.<\/li>\r\n \t<li>Scan all incoming email and digital attachments formalware. The mail program should be configured to verify that attachments are of the expected type and fall into the typical size range. <strong>Important<\/strong>: Scanning may find attachments for executable malware programs but may be unable to detect malware <em>inside <\/em>a PDF or JPEG file. Malware inside such files is much more complex.<\/li>\r\n \t<li>Ensure all ballots returned by electronic means are printed for counting and not electronically transmitted to the EMS for tallying.<\/li>\r\n \t<li>Provide all voters with information and options for mailing ballots back by postal mail.<\/li>\r\n \t<li>Ensure military voters are aware of the free expedited postal mail option available to them. Recommendations for voters:<\/li>\r\n \t<li>Voters who receive blank ballots in the mail are encouraged to mark the ballots and mail them back.<\/li>\r\n \t<li>Voters who receive blank ballots by email are encouraged to print out the ballot and mark it by hand if possible. If marking the ballot using a computer, print out the final version and carefully review the choices before mailing it back.<\/li>\r\n \t<li>Send the ballot back by postal mail. Military personnel in army, fleet or diplomatic post office (APO\/FPO\/ DPO) locations can return absentee ballots via Priority Mail Express using the free Express Mail Label 11-DOD.<\/li>\r\n<\/ul>\r\nAfter the 2018 general election, states that permit online return of voted ballots should eliminate the practice. This will require legislative action in most states. While imposing a quarantine on incoming ballots is helpful, that will by no means stop a sophisticated attacker from attempting to use ballots in a spear phishing attack or corrupting ballots in transit. Additionally, federal agencies charged with assisting states in strengthening their election security should exercise leadership and publish warnings regarding the online return of voted ballots."}},{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":"","component_wysiwyg":{"content":"<a class=\"button1\" role=\"button\" target=\"_blank\" href=\"https:\/\/www.commoncause.org\/vi\/electionsecurityreport\/\">read Download the Full Report: \" Email and Internet Voting: The Overlooked Threat to Election Security\"<\/a>"}},{"acf_fc_layout":"layout_add_component","_acfe_flexible_toggle":"","component_add_component":null},{"acf_fc_layout":"layout_work","_acfe_flexible_toggle":"","component_work":{"heading":"Work","manually_curate":false,"work":null}},{"acf_fc_layout":"layout_resources","_acfe_flexible_toggle":"","component_resources":{"heading":"Related Resources","button_text":"See all Related Resources","manually_curate":false,"resource":null}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commoncause.org\/vi\/tai-nguyen-2\/bo-phieu-qua-email-va-internet-la-moi-de-doa-bi-bo-qua-doi-voi-an-ninh-bau-cu\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email and Internet Voting: The Overlooked Threat to Election Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commoncause.org\/vi\/tai-nguyen-2\/bo-phieu-qua-email-va-internet-la-moi-de-doa-bi-bo-qua-doi-voi-an-ninh-bau-cu\/\" \/>\n<meta property=\"og:site_name\" content=\"Common Cause\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommonCause\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T23:58:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CommonCause\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\",\"url\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\",\"name\":\"Email and Internet Voting: The Overlooked Threat to Election Security - Common Cause\",\"isPartOf\":{\"@id\":\"https:\/\/www.commoncause.org\/#website\"},\"datePublished\":\"2018-10-12T09:22:05+00:00\",\"dateModified\":\"2024-06-13T23:58:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.commoncause.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email and Internet Voting: The Overlooked Threat to Election Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.commoncause.org\/#website\",\"url\":\"https:\/\/www.commoncause.org\/\",\"name\":\"Common Cause\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.commoncause.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.commoncause.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.commoncause.org\/#organization\",\"name\":\"Common Cause\",\"url\":\"https:\/\/www.commoncause.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"contentUrl\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"width\":2066,\"height\":331,\"caption\":\"Common Cause\"},\"image\":{\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CommonCause\",\"https:\/\/x.com\/CommonCause\",\"https:\/\/www.instagram.com\/ourcommoncause\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"B\u1ecf phi\u1ebfu qua email v\u00e0 Internet: M\u1ed1i \u0111e d\u1ecda b\u1ecb b\u1ecf qua \u0111\u1ed1i v\u1edbi an ninh b\u1ea7u c\u1eed - Common Cause","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commoncause.org\/vi\/tai-nguyen-2\/bo-phieu-qua-email-va-internet-la-moi-de-doa-bi-bo-qua-doi-voi-an-ninh-bau-cu\/","og_locale":"vi_VN","og_type":"article","og_title":"Email and Internet Voting: The Overlooked Threat to Election Security","og_url":"https:\/\/www.commoncause.org\/vi\/tai-nguyen-2\/bo-phieu-qua-email-va-internet-la-moi-de-doa-bi-bo-qua-doi-voi-an-ninh-bau-cu\/","og_site_name":"Common Cause","article_publisher":"https:\/\/www.facebook.com\/CommonCause","article_modified_time":"2024-06-13T23:58:41+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CommonCause","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","url":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/","name":"B\u1ecf phi\u1ebfu qua email v\u00e0 Internet: M\u1ed1i \u0111e d\u1ecda b\u1ecb b\u1ecf qua \u0111\u1ed1i v\u1edbi an ninh b\u1ea7u c\u1eed - Common Cause","isPartOf":{"@id":"https:\/\/www.commoncause.org\/#website"},"datePublished":"2018-10-12T09:22:05+00:00","dateModified":"2024-06-13T23:58:41+00:00","breadcrumb":{"@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commoncause.org\/resources\/email-and-internet-voting-the-overlooked-threat-to-election-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commoncause.org\/"},{"@type":"ListItem","position":2,"name":"Email and Internet Voting: The Overlooked Threat to Election Security"}]},{"@type":"WebSite","@id":"https:\/\/www.commoncause.org\/#website","url":"https:\/\/www.commoncause.org\/","name":"Nguy\u00ean nh\u00e2n ph\u1ed5 bi\u1ebfn","description":"","publisher":{"@id":"https:\/\/www.commoncause.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.commoncause.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/www.commoncause.org\/#organization","name":"Nguy\u00ean nh\u00e2n ph\u1ed5 bi\u1ebfn","url":"https:\/\/www.commoncause.org\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","contentUrl":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","width":2066,"height":331,"caption":"Common Cause"},"image":{"@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommonCause","https:\/\/x.com\/CommonCause","https:\/\/www.instagram.com\/ourcommoncause\/"]}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Common Cause","distributor_original_site_url":"https:\/\/www.commoncause.org\/vi","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/resource\/11972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":1,"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/resource\/11972\/revisions"}],"predecessor-version":[{"id":20010,"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/resource\/11972\/revisions\/20010"}],"wp:attachment":[{"href":"https:\/\/www.commoncause.org\/vi\/wp-json\/wp\/v2\/media?parent=11972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}