HOME

TheInfoList



OR:

Election cybersecurity or election security refers to the protection of
election An election is a formal group decision-making process by which a population chooses an individual or multiple individuals to hold public office. Elections have been the usual mechanism by which modern representative democracy has opera ...
s and voting infrastructure from
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases. Cyber threats or attacks to elections or voting infrastructure could be carried out by insiders within a voting
jurisdiction Jurisdiction (from Latin 'law' + 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, areas of jurisdiction apply to local, state, and federal levels. Ju ...
, or by a variety of other actors ranging from nefarious
nation-states A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group. A nation, in the sense of a common ethnicity, may in ...
, to organized cyber criminals to lone-wolf hackers. Motives may range from a desire to influence the election outcome, to discrediting democratic processes, to creating public distrust or even political upheaval.


Legislation and policy best practices

A variety of experts and interest groups have emerged to address voting infrastructure vulnerabilities and to support democracies in their security efforts. From these efforts have come a general set of policy ideas for election security, including: * Transition from black-box proprietary voting systems to transparent
open-source voting systems An open-source voting system (OSVS), also known as open-source voting (or OSV), is a voting system that uses open-source software (and/or hardware) that is completely transparent in its design in order to be checked by anyone for bugs or issues. ...
* Implement universal use of paper ballots, marked by hand and read by optical scanner, ensuring a voter-verified paper audit trail ( VVPAT). * Pass voter machine certification requirements that, for example, phase out touch-screen voting machines – especially the most vulnerable direct-recording electronic (DRE) devices and follow recommendations like those by the US Election Assistance Commission. * Verify voting results by requiring election officials to conduct
risk-limiting audits A risk-limiting audit (RLA) is a post-election tabulation auditing procedure which can limit the risk that the reported outcome in an election contest is incorrect. It generally involves (1) storing voter-verified paper ballots securely until they ...
, a statistical post-election audit before certification of final results. * Ballot accounting and reconciliation to ensure all ballots are accounted for * Give voters an opportunity to fix any mistakes that would otherwise get their ballots thrown out * Ban
electronic voting Electronic voting (also known as e-voting) is voting that uses electronic means to either aid or take care of casting and counting ballots. Depending on the particular implementation, e-voting may use standalone '' electronic voting machines'' ...
* Secure all voting infrastructure from databases to equipment using cyber hygiene tools such as the CIS “20 Critical Security Controls” or NIST's Cybersecurity Framework. * Provide resources, training and information-sharing to election leaders for cyber maintenance and on-going monitoring. * Designate elections as critical infrastructure and provide appropriate funding to implement infrastructure upgrades, audits, and cyber hygiene measures. * Pre-election logic and accuracy testing to check for equipment malfunctions * Institute a pre-election threat assessment plan to bolster technical support capacity for election officials requesting assistance. ** Call upon outside experts to conduct cyber assessments – government specialists, white-hat hackers, cybersecurity vendors and security researchers – where needed.


Role of white hat hackers

The "white hat" hacker community has also been involved in the public debate. From July 27–30, 2017, DEFCON – the world's largest, longest running and best-known hacker conference – hosted a “Voting Machine Hacking Village” at its annual conference in Las Vegas, Nevada to highlight election security vulnerabilities. The event featured 25 different pieces of voting equipment used in federal, state and local U.S. elections and made them available to white-hat hackers and IT researchers for the purpose of education, experimentation, and to demonstrate the cyber vulnerabilities of such equipment. During the 3-day event, thousands of hackers, media and elected officials witnessed the hacking of every piece of equipment, with the first machine to be compromised in under 90 minutes. One voting machine was hacked remotely and was configured to play Rick Astley's song "
Never Gonna Give You Up "Never Gonna Give You Up" is the debut single recorded by English singer and songwriter Rick Astley, released on 27 July 1987. It is one of Astley's most famous songs. It was written and produced by Stock Aitken Waterman, and was released as ...
." Additional findings of the Voting Village were published in a report issued by DEFCON in October 2017. The "Voting Village" was brought back for a second year at DEF CON, which was held in Las Vegas, August 9–12, 2018. The 2018 event dramatically expanded its inquiries to include more of the election environment, from voter registration records to election night reporting and many more of the humans and machines in the middle. DEF CON 2018 also featured a greater variety of voting machines, election officials, equipment, election system processes, and election night reporting. Voting Village participants consisted of hackers, IT and security professionals, journalists, lawyers, academics, and local, state and federal government leaders. A full report was issued on the 2018 Village Findings at a press conference in Washington, DC, held on September 27, 201


Europe

Russia's 2016 attempts to interfere in U.S. elections fits a pattern of similar incidents across
Europe Europe is a large peninsula conventionally considered a continent in its own right because of its great physical size and the weight of its history and traditions. Europe is also considered a subcontinent of Eurasia and it is located enti ...
for at least a decade. Cyberattacks in
Ukraine Ukraine ( uk, Україна, Ukraïna, ) is a country in Eastern Europe. It is the second-largest European country after Russia, which it borders to the east and northeast. Ukraine covers approximately . Prior to the ongoing Russian invas ...
,
Bulgaria Bulgaria (; bg, България, Bǎlgariya), officially the Republic of Bulgaria,, ) is a country in Southeast Europe. It is situated on the eastern flank of the Balkans, and is bordered by Romania to the north, Serbia and North Mac ...
,
Estonia Estonia, formally the Republic of Estonia, is a country by the Baltic Sea in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the sea across from Sweden, to the south by Latvia, and t ...
,
Germany Germany, officially the Federal Republic of Germany (FRG),, is a country in Central Europe. It is the most populous member state of the European Union. Germany lies between the Baltic and North Sea to the north and the Alps to the sou ...
,
France France (), officially the French Republic ( ), is a country primarily located in Western Europe. It also comprises of overseas regions and territories in the Americas and the Atlantic, Pacific and Indian Oceans. Its metropolitan ar ...
and
Austria Austria, , bar, Östareich officially the Republic of Austria, is a country in the southern part of Central Europe, lying in the Eastern Alps. It is a federation of nine states, one of which is the capital, Vienna, the most populous ...
that investigators attributed to suspected Kremlin-backed hackers appeared aimed at influencing election results, sowing discord and undermining trust in public institutions that include government agencies, the media and elected officials.


United States

The
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
is characterized by a highly decentralized election administration system. Elections are a constitutional responsibility of state and local election entities such as secretaries of state, election directors, county clerks or other local level officials encompassing more than 6,000+ local subdivisions nationwide. However, election security has been characterized as a national security concern increasingly drawing the involvement of federal government entities such as the U.S. Department of Homeland Security. In early 2016, Jeh Johnson, Secretary of Homeland Security designated elections as “critical infrastructure” making the subsector eligible to receive prioritized cybersecurity assistance and other federal protections from the Department of Homeland Security. The designation applies to storage facilities, polling places, and centralized vote tabulations locations used to support the election process, and information and communications technology to include voter registration databases, voting machines, and other systems to manage the election process and report and display results on behalf of state and local governments. In particular, hackers falsifying official instructions before an election could affect voter turnout or hackers falsifying online results after an election could sow discord.


Post 2016 Election

Election security has become a major focus and area of debate in recent years, especially since the
2016 U.S. Presidential Election The 2016 United States presidential election was the 58th quadrennial United States presidential election, presidential election, held on Tuesday, November 8, 2016. The Republican Party (United States), Republican ticket of businessman Donald ...
. In 2017, DHS confirmed that a U.S. foreign adversary,
Russia Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-eigh ...
, attempted to interfere in the 2016 U.S. Presidential Election via “a multi-faceted approach intended to undermine confidence in he Americandemocratic process." This included conducting cyber espionage against political targets, launching propaganda or “information operations” (IO) campaigns on social media, and accessing elements of multiple U.S. state or local electoral boards. On September 22, 2017, it was reported that the U.S. Department of Homeland Security (DHS) notified 21 states that they were targeted by Kremlin-backed hackers during the 2016 election. Those states included
Alabama (We dare defend our rights) , anthem = " Alabama" , image_map = Alabama in United States.svg , seat = Montgomery , LargestCity = Huntsville , LargestCounty = Baldwin County , LargestMetro = Greater Birmingham , area_total_km2 = 135,7 ...
,
Alaska Alaska ( ; russian: Аляска, Alyaska; ale, Alax̂sxax̂; ; ems, Alas'kaaq; Yup'ik: ''Alaskaq''; tli, Anáaski) is a state located in the Western United States on the northwest extremity of North America. A semi-exclave of the U.S ...
,
Colorado Colorado (, other variants) is a state in the Mountain states, Mountain West subregion of the Western United States. It encompasses most of the Southern Rocky Mountains, as well as the northeastern portion of the Colorado Plateau and the wes ...
,
Connecticut Connecticut () is the southernmost state in the New England region of the Northeastern United States. It is bordered by Rhode Island to the east, Massachusetts to the north, New York to the west, and Long Island Sound to the south. Its cap ...
,
Delaware Delaware ( ) is a state in the Mid-Atlantic region of the United States, bordering Maryland to its south and west; Pennsylvania to its north; and New Jersey and the Atlantic Ocean to its east. The state takes its name from the adjacen ...
,
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, a ...
,
Illinois Illinois ( ) is a state in the Midwestern United States. Its largest metropolitan areas include the Chicago metropolitan area, and the Metro East section, of Greater St. Louis. Other smaller metropolitan areas include, Peoria and Roc ...
,
Maryland Maryland ( ) is a U.S. state, state in the Mid-Atlantic (United States), Mid-Atlantic region of the United States. It shares borders with Virginia, West Virginia, and the District of Columbia to its south and west; Pennsylvania to its north; ...
,
Minnesota Minnesota () is a state in the upper midwestern region of the United States. It is the 12th largest U.S. state in area and the List of U.S. states and territories by population, 22nd most populous, with over 5.75 million residents. Minne ...
,
Ohio Ohio () is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. Of the List of states and territories of the United States, fifty U.S. states, it is the List of U.S. states and territories by area, 34th-l ...
, Oklahoma,
Oregon Oregon () is a state in the Pacific Northwest region of the Western United States. The Columbia River delineates much of Oregon's northern boundary with Washington, while the Snake River delineates much of its eastern boundary with Idah ...
,
North Dakota North Dakota () is a U.S. state in the Upper Midwest, named after the indigenous Dakota Sioux. North Dakota is bordered by the Canadian provinces of Saskatchewan and Manitoba to the north and by the U.S. states of Minnesota to the east, S ...
,
Pennsylvania Pennsylvania (; (Pennsylvania Dutch: )), officially the Commonwealth of Pennsylvania, is a state spanning the Mid-Atlantic, Northeastern, Appalachian, and Great Lakes regions of the United States. It borders Delaware to its southeast, Ma ...
,
Virginia Virginia, officially the Commonwealth of Virginia, is a state in the Mid-Atlantic and Southeastern regions of the United States, between the East Coast of the United States, Atlantic Coast and the Appalachian Mountains. The geography an ...
, Washington,2
Arizona Arizona ( ; nv, Hoozdo Hahoodzo ; ood, Alĭ ṣonak ) is a U.S. state, state in the Southwestern United States. It is the list of U.S. states and territories by area, 6th largest and the list of U.S. states and territories by population, 14 ...
,
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
,
Iowa Iowa () is a U.S. state, state in the Midwestern United States, Midwestern region of the United States, bordered by the Mississippi River to the east and the Missouri River and Big Sioux River to the west. It is bordered by six states: Wiscon ...
,
Texas Texas (, ; Spanish language, Spanish: ''Texas'', ''Tejas'') is a state in the South Central United States, South Central region of the United States. At 268,596 square miles (695,662 km2), and with more than 29.1 million residents in 2 ...
, and
Wisconsin Wisconsin () is a state in the upper Midwestern United States. Wisconsin is the 25th-largest state by total area and the 20th-most populous. It is bordered by Minnesota to the west, Iowa to the southwest, Illinois to the south, Lake M ...
. Currently, hackers only reportedly succeeded in breaching the voter registration system of one state: Illinois. In the aftermath of the 2016 hacking, a growing bench of national security and cyber experts have emerged noting that Russia is just one potential threat. Other actors including
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and shares borders with China and Russia to the north, at the Yalu (Amnok) and ...
,
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkm ...
, organized criminals possess, and individual hackers have motives and technical capability to infiltrate or interfere with elections and democratic operations. Leaders and experts have warned that a future attack on elections or voting infrastructure by Russian-backed hackers or others with nefarious intent, such as seen in 2016, is likely in 2018 and beyond. One recommendation to prevent disinformation from fake election-related web sites and
email spoofing Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an un ...
is for local governments to use
.gov The domain name gov is a sponsored top-level domain (sTLD) in the Domain Name System of the Internet. The name is derived from the word ''government'', indicating its restricted use by government entities. The TLD is administered by the Cyber ...
domain names for web sites and email addresses. These are controlled by the federal government, which authenticates the legitimate government controls the domain. Many local governments use
.com The domain name .com is a top-level domain (TLD) in the Domain Name System (DNS) of the Internet. Added at the beginning of 1985, its name is derived from the word ''commercial'', indicating its original intended purpose for domains registere ...
or other top-level domain names; an attacker could easily and quickly set up an altered copy of the site on a similar-sounding .com address using a private registrar. In 2018 assessment of US state election security by the
Center for American Progress The Center for American Progress (CAP) is a public policy research and advocacy organization which presents a liberal viewpoint on economic and social issues. It has its headquarters in Washington, D.C. The president and chief executive of ...
, no state received an “A” based on their measurements of seven election security factors. Forty states received a grade of C or below.  A separate 2017 report from the Center for American Progress outlines nine solutions which states can implement to secure their elections; including requiring paper ballots or records of every vote, the replacement of outdated voting equipment, conducting post election audits, enacting cybersecurity standards for voting systems, pre-election testing of voting equipment, threat assessments, coordination of election security between state and federal agencies, and the allocating of federal funds for ensuring election security.


See also

*
Open-source voting systems An open-source voting system (OSVS), also known as open-source voting (or OSV), is a voting system that uses open-source software (and/or hardware) that is completely transparent in its design in order to be checked by anyone for bugs or issues. ...
*
Verified Voting Foundation The Verified Voting Foundation is a non-governmental, nonpartisan organization founded in 2004 by David L. Dill, a computer scientist from Stanford University, focused on how technology impacts the administration of US elections. The organization� ...
* Voluntary Voting System Guidelines


References


External links


Verified Voting
- U.S. advocacy organization that catalogs voting equipment used in each state {{Corruption Elections Electoral systems Electoral fraud National security Security technology Information governance Cyberwarfare Cryptography Cybercrime