HOME

TheInfoList



OR:

Election cybersecurity or election security refers to the protection of
election An election is a formal group decision-making process by which a population chooses an individual or multiple individuals to hold public office. Elections have been the usual mechanism by which modern representative democracy has opera ...
s and voting infrastructure from
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases. Cyber threats or attacks to elections or voting infrastructure could be carried out by insiders within a voting
jurisdiction Jurisdiction (from Latin 'law' + 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, areas of jurisdiction apply to local, state, and federal levels. Jur ...
, or by a variety of other actors ranging from nefarious
nation-states A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group. A nation, in the sense of a common ethnicity, may i ...
, to organized cyber criminals to lone-wolf hackers. Motives may range from a desire to influence the election outcome, to discrediting democratic processes, to creating public distrust or even political upheaval.


Legislation and policy best practices

A variety of experts and interest groups have emerged to address voting infrastructure vulnerabilities and to support democracies in their security efforts. From these efforts have come a general set of policy ideas for election security, including: * Transition from black-box proprietary voting systems to transparent open-source voting systems * Implement universal use of paper ballots, marked by hand and read by optical scanner, ensuring a voter-verified paper audit trail (
VVPAT Voter verifiable paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allo ...
). * Pass voter machine certification requirements that, for example, phase out touch-screen voting machines – especially the most vulnerable direct-recording electronic (DRE) devices and follow recommendations like those by the US Election Assistance Commission. * Verify voting results by requiring election officials to conduct risk-limiting audits, a statistical post-election audit before certification of final results. * Ballot accounting and reconciliation to ensure all ballots are accounted for * Give voters an opportunity to fix any mistakes that would otherwise get their ballots thrown out * Ban
electronic voting Electronic voting (also known as e-voting) is voting that uses electronic means to either aid or take care of casting and counting ballots. Depending on the particular implementation, e-voting may use standalone ''electronic voting machines'' ( ...
* Secure all voting infrastructure from databases to equipment using cyber hygiene tools such as the CIS “20 Critical Security Controls” or NIST's Cybersecurity Framework. * Provide resources, training and information-sharing to election leaders for cyber maintenance and on-going monitoring. * Designate elections as critical infrastructure and provide appropriate funding to implement infrastructure upgrades, audits, and cyber hygiene measures. * Pre-election logic and accuracy testing to check for equipment malfunctions * Institute a pre-election threat assessment plan to bolster technical support capacity for election officials requesting assistance. ** Call upon outside experts to conduct cyber assessments – government specialists, white-hat hackers, cybersecurity vendors and security researchers – where needed.


Role of white hat hackers

The "white hat" hacker community has also been involved in the public debate. From July 27–30, 2017,
DEFCON The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces. (DEFCON is not mentioned in the 2010 and newer document) The DEFCON system was developed by the Joint Chiefs of Staff (JCS) and unified and spe ...
– the world's largest, longest running and best-known hacker conference – hosted a “Voting Machine Hacking Village” at its annual conference in Las Vegas, Nevada to highlight election security vulnerabilities. The event featured 25 different pieces of voting equipment used in federal, state and local U.S. elections and made them available to white-hat hackers and IT researchers for the purpose of education, experimentation, and to demonstrate the cyber vulnerabilities of such equipment. During the 3-day event, thousands of hackers, media and elected officials witnessed the hacking of every piece of equipment, with the first machine to be compromised in under 90 minutes. One voting machine was hacked remotely and was configured to play Rick Astley's song "
Never Gonna Give You Up "Never Gonna Give You Up" is the debut single recorded by English singer and songwriter Rick Astley, released on 27 July 1987. It is one of Astley's most famous songs. It was written and produced by Stock Aitken Waterman, and was released as ...
." Additional findings of the Voting Village were published in a report issued by DEFCON in October 2017. The "Voting Village" was brought back for a second year at DEF CON, which was held in Las Vegas, August 9–12, 2018. The 2018 event dramatically expanded its inquiries to include more of the election environment, from voter registration records to election night reporting and many more of the humans and machines in the middle. DEF CON 2018 also featured a greater variety of voting machines, election officials, equipment, election system processes, and election night reporting. Voting Village participants consisted of hackers, IT and security professionals, journalists, lawyers, academics, and local, state and federal government leaders. A full report was issued on the 2018 Village Findings at a press conference in Washington, DC, held on September 27, 201


Europe

Russia's 2016 attempts to interfere in U.S. elections fits a pattern of similar incidents across
Europe Europe is a large peninsula conventionally considered a continent in its own right because of its great physical size and the weight of its history and traditions. Europe is also considered a Continent#Subcontinents, subcontinent of Eurasia ...
for at least a decade. Cyberattacks in
Ukraine Ukraine ( uk, Україна, Ukraïna, ) is a country in Eastern Europe. It is the second-largest European country after Russia, which it borders to the east and northeast. Ukraine covers approximately . Prior to the ongoing Russian inv ...
,
Bulgaria Bulgaria (; bg, България, Bǎlgariya), officially the Republic of Bulgaria,, ) is a country in Southeast Europe. It is situated on the eastern flank of the Balkans, and is bordered by Romania to the north, Serbia and North Macedon ...
,
Estonia Estonia, formally the Republic of Estonia, is a country by the Baltic Sea in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the sea across from Sweden, to the south by Latvia, a ...
,
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwe ...
,
France France (), officially the French Republic ( ), is a country primarily located in Western Europe. It also comprises of Overseas France, overseas regions and territories in the Americas and the Atlantic Ocean, Atlantic, Pacific Ocean, Pac ...
and
Austria Austria, , bar, Östareich officially the Republic of Austria, is a country in the southern part of Central Europe, lying in the Eastern Alps. It is a federation of nine states, one of which is the capital, Vienna, the most populous ...
that investigators attributed to suspected Kremlin-backed hackers appeared aimed at influencing election results, sowing discord and undermining trust in public institutions that include government agencies, the media and elected officials.


United States

The
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
is characterized by a highly decentralized election administration system. Elections are a constitutional responsibility of state and local election entities such as secretaries of state, election directors, county clerks or other local level officials encompassing more than 6,000+ local subdivisions nationwide. However, election security has been characterized as a national security concern increasingly drawing the involvement of federal government entities such as the
U.S. Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
. In early 2016,
Jeh Johnson Jeh Charles Johnson ( "Jay"; born September 11, 1957) is an American lawyer and former government official. He was United States Secretary of Homeland Security from 2013 to 2017. From 2009 to 2012, Johnson was the general counsel of the Departm ...
, Secretary of Homeland Security designated elections as “critical infrastructure” making the subsector eligible to receive prioritized cybersecurity assistance and other federal protections from the Department of Homeland Security. The designation applies to storage facilities, polling places, and centralized vote tabulations locations used to support the election process, and information and communications technology to include voter registration databases, voting machines, and other systems to manage the election process and report and display results on behalf of state and local governments. In particular, hackers falsifying official instructions before an election could affect voter turnout or hackers falsifying online results after an election could sow discord.


Post 2016 Election

Election security has become a major focus and area of debate in recent years, especially since the 2016 U.S. Presidential Election. In 2017, DHS confirmed that a U.S. foreign adversary,
Russia Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
, attempted to interfere in the 2016 U.S. Presidential Election via “a multi-faceted approach intended to undermine confidence in
he American He or HE may refer to: Language * He (pronoun), an English pronoun * He (kana), the romanization of the Japanese kana へ * He (letter), the fifth letter of many Semitic alphabets * He (Cyrillic), a letter of the Cyrillic script called ''He'' ...
democratic process." This included conducting cyber espionage against political targets, launching propaganda or “information operations” (IO) campaigns on social media, and accessing elements of multiple U.S. state or local electoral boards. On September 22, 2017, it was reported that the U.S. Department of Homeland Security (DHS) notified 21 states that they were targeted by Kremlin-backed hackers during the 2016 election. Those states included
Alabama (We dare defend our rights) , anthem = "Alabama (state song), Alabama" , image_map = Alabama in United States.svg , seat = Montgomery, Alabama, Montgomery , LargestCity = Huntsville, Alabama, Huntsville , LargestCounty = Baldwin County, Al ...
,
Alaska Alaska ( ; russian: Аляска, Alyaska; ale, Alax̂sxax̂; ; ems, Alas'kaaq; Yup'ik: ''Alaskaq''; tli, Anáaski) is a state located in the Western United States on the northwest extremity of North America. A semi-exclave of the U.S., ...
,
Colorado Colorado (, other variants) is a state in the Mountain West subregion of the Western United States. It encompasses most of the Southern Rocky Mountains, as well as the northeastern portion of the Colorado Plateau and the western edge of t ...
,
Connecticut Connecticut () is the southernmost state in the New England region of the Northeastern United States. It is bordered by Rhode Island to the east, Massachusetts to the north, New York to the west, and Long Island Sound to the south. Its cap ...
,
Delaware Delaware ( ) is a state in the Mid-Atlantic region of the United States, bordering Maryland to its south and west; Pennsylvania to its north; and New Jersey and the Atlantic Ocean to its east. The state takes its name from the adjacent Del ...
,
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, and to ...
,
Illinois Illinois ( ) is a U.S. state, state in the Midwestern United States, Midwestern United States. Its largest metropolitan areas include the Chicago metropolitan area, and the Metro East section, of Greater St. Louis. Other smaller metropolita ...
,
Maryland Maryland ( ) is a state in the Mid-Atlantic region of the United States. It shares borders with Virginia, West Virginia, and the District of Columbia to its south and west; Pennsylvania to its north; and Delaware and the Atlantic Ocean to ...
,
Minnesota Minnesota () is a state in the upper midwestern region of the United States. It is the 12th largest U.S. state in area and the 22nd most populous, with over 5.75 million residents. Minnesota is home to western prairies, now given over to ...
,
Ohio Ohio () is a state in the Midwestern region of the United States. Of the fifty U.S. states, it is the 34th-largest by area, and with a population of nearly 11.8 million, is the seventh-most populous and tenth-most densely populated. The sta ...
,
Oklahoma Oklahoma (; Choctaw language, Choctaw: ; chr, ᎣᎧᎳᎰᎹ, ''Okalahoma'' ) is a U.S. state, state in the South Central United States, South Central region of the United States, bordered by Texas on the south and west, Kansas on the nor ...
,
Oregon Oregon () is a U.S. state, state in the Pacific Northwest region of the Western United States. The Columbia River delineates much of Oregon's northern boundary with Washington (state), Washington, while the Snake River delineates much of it ...
,
North Dakota North Dakota () is a U.S. state in the Upper Midwest, named after the Native Americans in the United States, indigenous Dakota people, Dakota Sioux. North Dakota is bordered by the Canadian provinces of Saskatchewan and Manitoba to the north a ...
,
Pennsylvania Pennsylvania (; ( Pennsylvania Dutch: )), officially the Commonwealth of Pennsylvania, is a state spanning the Mid-Atlantic, Northeastern, Appalachian, and Great Lakes regions of the United States. It borders Delaware to its southeast, ...
,
Virginia Virginia, officially the Commonwealth of Virginia, is a state in the Mid-Atlantic and Southeastern regions of the United States, between the Atlantic Coast and the Appalachian Mountains. The geography and climate of the Commonwealth ar ...
,
Washington Washington commonly refers to: * Washington (state), United States * Washington, D.C., the capital of the United States ** A metonym for the federal government of the United States ** Washington metropolitan area, the metropolitan area centered o ...
,2
Arizona Arizona ( ; nv, Hoozdo Hahoodzo ; ood, Alĭ ṣonak ) is a state in the Southwestern United States. It is the 6th largest and the 14th most populous of the 50 states. Its capital and largest city is Phoenix. Arizona is part of the Fou ...
,
California California is a U.S. state, state in the Western United States, located along the West Coast of the United States, Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the List of states and territori ...
,
Iowa Iowa () is a state in the Midwestern region of the United States, bordered by the Mississippi River to the east and the Missouri River and Big Sioux River to the west. It is bordered by six states: Wisconsin to the northeast, Illinois to the ...
,
Texas Texas (, ; Spanish language, Spanish: ''Texas'', ''Tejas'') is a state in the South Central United States, South Central region of the United States. At 268,596 square miles (695,662 km2), and with more than 29.1 million residents in 2 ...
, and
Wisconsin Wisconsin () is a state in the upper Midwestern United States. Wisconsin is the 25th-largest state by total area and the 20th-most populous. It is bordered by Minnesota to the west, Iowa to the southwest, Illinois to the south, Lake M ...
. Currently, hackers only reportedly succeeded in breaching the voter registration system of one state: Illinois. In the aftermath of the 2016 hacking, a growing bench of national security and cyber experts have emerged noting that Russia is just one potential threat. Other actors including
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and shares borders with China and Russia to the north, at the Yalu River, Y ...
,
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
, organized criminals possess, and individual hackers have motives and technical capability to infiltrate or interfere with elections and democratic operations. Leaders and experts have warned that a future attack on elections or voting infrastructure by Russian-backed hackers or others with nefarious intent, such as seen in 2016, is likely in 2018 and beyond. One recommendation to prevent disinformation from fake election-related web sites and
email spoofing Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unr ...
is for local governments to use
.gov The domain name gov is a sponsored top-level domain (sTLD) in the Domain Name System of the Internet. The name is derived from the word ''government'', indicating its restricted use by government entities. The TLD is administered by the Cyber ...
domain names for web sites and email addresses. These are controlled by the federal government, which authenticates the legitimate government controls the domain. Many local governments use
.com The domain name .com is a top-level domain (TLD) in the Domain Name System (DNS) of the Internet. Added at the beginning of 1985, its name is derived from the word ''commercial'', indicating its original intended purpose for domains registere ...
or other top-level domain names; an attacker could easily and quickly set up an altered copy of the site on a similar-sounding .com address using a private registrar. In 2018 assessment of US state election security by the
Center for American Progress The Center for American Progress (CAP) is a public policy research and advocacy organization which presents a liberal viewpoint on economic and social issues. It has its headquarters in Washington, D.C. The president and chief executive officer ...
, no state received an “A” based on their measurements of seven election security factors. Forty states received a grade of C or below.  A separate 2017 report from the Center for American Progress outlines nine solutions which states can implement to secure their elections; including requiring paper ballots or records of every vote, the replacement of outdated voting equipment, conducting post election audits, enacting cybersecurity standards for voting systems, pre-election testing of voting equipment, threat assessments, coordination of election security between state and federal agencies, and the allocating of federal funds for ensuring election security.


See also

* Open-source voting systems *
Verified Voting Foundation The Verified Voting Foundation is a non-governmental, nonpartisan organization founded in 2004 by David L. Dill, a computer scientist from Stanford University, focused on how technology impacts the administration of US elections. The organization ...
*
Voluntary Voting System Guidelines The Voluntary Voting System Guidelines (VVSG) are guidelines adopted by the United States Election Assistance Commission (EAC) for the certification of voting systems. The National Institute of Standards and Technology's Technical Guidelines Develo ...


References


External links


Verified Voting
- U.S. advocacy organization that catalogs voting equipment used in each state {{Corruption Elections Electoral systems Electoral fraud National security Security technology Information governance Cyberwarfare Cryptography Cybercrime