Are US Voting Machines Secure From Hackers?

Some key swing states have declined an offer from the Homeland Security Department to scan voting systems for hackers ahead of the presidential elections.

As suspected Russian-sponsored attackers compromise Democratic Party and other US political data allegedly to sway voter opinion, some security experts say it wouldn’t even take the resources of a foreign nation to manipulate actual votes using this country’s antiquated tallying systems.

Against this backdrop, Homeland Security Secretary Jeh Johnson during an Aug. 15 call with state election officials, offered states DHS services that can inspect voting systems for bugs and other hacker entryways. Earlier in the month, he also suggested the federal government label election systems as official US critical infrastructure, like the power grid.

But some battleground states, including Georgia and Pennsylvania, say they will rely on in-house security crews to maintain the integrity of voter data.

“The question remains whether the federal government will subvert the Constitution to achieve the goal of federalizing elections under the guise of security,” Georgia Secretary of State Brian Kemp told Nextgov in an email. “Designating voting systems or any other election system as critical infrastructure would be a vast federal overreach, the cost of which would not equally improve the security of elections in the United States.”

Georgia, where some projections show presidential contenders Hillary Clinton and Donald Trump neck and neck, reportedly could use a vote machine reboot.

“Georgia, which is running electronic-only machines—there’s no paper trail. … And the machines they’re using are more than a decade old, so the hardware is falling apart. And the operating system they’re using is Windows 2000, which hasn’t been updated for security for years, which means it’s a sitting duck,” Zeynep Tufekci, a University of North Carolina information and library science professor, told NPR on recently.  

There is no evidence ballot manipulation has ever occurred in the United States, and, per Johnson, DHS is not aware of any credible cyber-threats related to 2016 general election systems.

All the same, vote machine hacks are all the rage among researchers at Las Vegas hacker confabs.  

Even top White House tech privacy adviser Ed Felten helped demonstrate the weaknesses of digital voting booths in his previous life as a Princeton University academic. In a 2009 paper Felten co-authored, researchers commanded an AVC Advantage voting machine, the kind still deployed in Pennsylvania and other states, to steal votes. No Internet required. They altered a pretend election by inserting a malicious memory cartridge the size of a paperback book that would typically be used for recording votes. The tainted device combined snippets of authorized code inside the system to cause the unauthorized behavior.   

“An attacker who has access to the machine the night before an election can use our techniques to affect the outcome of an election by replacing the election program with another whose visible behavior is nearly indistinguishable from the legitimate program but that adds, removes or changes votes as the attacker wishes,” Felten and colleagues from Princeton, University of California at San Diego and the University of Michigan wrote in “Proceedings of the 2009 Electronic Voting Technology Workshop.”

No Recounts

Because of hacking concerns, many states are keeping a paper trail to audit the vote count, but not all. In addition to Georgia, parts of Pennsylvania, another tossup state, do not maintain paper backups in the event of a hack, Tufekci said.

Pennsylvania officials say cybersecurity experts from the commonwealth’s IT shop work closely with the state elections team to secure voting-related infrastructure. “Pennsylvania has implemented policies, technologies, best practices and procedures around the safeguarding of data and the protection of our applications, systems and resources,” Pennsylvania Department of State spokeswoman Wanda Murren said. “We constantly monitor our data and systems for vulnerabilities and attempted attacks in order to keep pace with the rapidly evolving threat landscape.”
She declined to go into specifics as a matter of policy.

A Homeland Security spokesman told Nextgov on background “several states” currently use DHS hygiene scans and assessment services for voting systems. He would not disclose the names of any jurisdictions.

Florida, where Trump has been down nine points, declined to say whether it will ask DHS to scan local voting machines but did participate in the national teleconference with Johnson.

The Florida secretary of State Department “is engaged with DHS, in addition to all of our other state and federal stakeholders, on an ongoing basis to help ensure the security and integrity of Florida elections,” department spokeswoman Meredith M. Beatrice said.

Ohio, where Clinton has a narrow advantage over Trump, appears to be taking advantage of some DHS support for election cybersecurity.

“The Ohio Department of Homeland Security is working with their federal counterparts, so we are working through them to perform the needed scans,” Ohio secretary of state spokesman Joshua Eck told Nextgov in an email.

Richard Clarke, a former National Security Council adviser under presidents Bill Clinton and both of the George Bushes, cautions it could be hard to detect a slight manipulation of voter data in some swing precincts.

“Smart malware can be programmed to switch only a small percentage of votes from what the voters intended. That may be all that is needed,” Clarke, now an ABC News consultant, commented recently.

DefenseOne

« Islamic State Members Embedded In Government
UAE Using Israeli Spy Technology »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

OneID

OneID

OneID is the only UK identity service with access to bank-verified data to ensure that every transaction is protected by the most advanced counter-fraud measures.