Voting Security: Did Your Vote Count?

Voting Security: Did Your Vote Count?

The most recent elections is the most secure in the nation’s history. Or, is it? Government officials say it is the most secure ever.

Fewer voters are set to use the riskiest machines — electronic systems that leave no paper record — as compared to four years ago, and there is a whole-of-government approach to election security that never existed before.

"My confidence in the security of your vote has never been higher," said Chris Krebs, the director of the Department of Homeland Security's cybersecurity arm, in an election security video featuring a number of top national security officials released last month.

The same vulnerabilities exposed in Russia's attack on the 2016 election have not disappeared. Security experts have recommended that the United States spend billions of dollars to improve systems nationwide. Congress didn’t see it that way, allocating only a fraction of that.

And while social media companies have worked to control influence operations and lies that spread on their platforms, the federal government has declined to regulate those changes. Experts say bad information is still spreading rapidly online — helped by many Americans users who have helped to sustain the explosion of questionable material.
Article continues after sponsor message

Now, four years removed from an election that the intelligence community and bipartisan congressional committees agree was marred by an unprecedented level of interference, the U.S. is set to conclude another round of voting on Tuesday.

The Votes Themselves
Many Americans remain worried about the possibility that a foreign adversary could manipulate vote totals, there is no evidence this has ever happened in an American election — even in 2016 when Russian attackers were able to hack into the registration databases of a number of states.

Experts agree that actual votes would probably be the most difficult part of an election to successfully hack. The problem has only gotten tougher. In 2016, nearly 28 million voters cast ballots that did not have a corresponding paper trail: a major cybersecurity red flag.

This year, that number may be less than 10 million. Eliminating the paperless machines makes it more difficult for a cyberattack to affect votes and go undetected.

In many jurisdictions, including the state of Georgia, officials replaced their paperless machines with machines that print out a piece of paper that allows the voter to verify their selections before the ballot is counted.

This gives the voter the ability to vote using the machine, but then also to check to make sure their vote was recorded accurately.

The problem is, research suggests only a small number of voters actually check the paper the machine prints out, making it questionable at best whether an attack that changes voter selections actually would be caught by this method.

Audit Trail
The way officials can demonstrate that, Stark says, is through public auditing, a process that not every state uses. Even among the states that do some sort of audit, only a few do what are considered the "gold standard" of post-election audits, called risk limiting audits.

Proposed legislation from Sen. Ron Wyden (D-OR) to mandate such audits nationwide, but election reforms have gained little to no traction with the Republican-controlled Senate.

The Bottom Line
Your 2020 vote is almost certainly safe, but some security experts won't be fully satisfied until the majority of votes are hand-marked, and the auditing process is advanced and rigorous enough to validate the results.

Considering the disparate nature of U.S. elections, that reality is still a ways away.

Hacks that Don't Touch the Results
While actually affecting the vote totals remains difficult, other aspects of election infrastructure, like websites that post-election information, are significantly more vulnerable.

Many local governments haven't taken simple steps that would make it more difficult for attackers to set up fake websites to post fake results, for instance.

Cybersecurity and Infrastructure Security Agency officials said at a briefing last week that he expects attackers to try to target election websites to either deface them, or just shut them down for a period of time. Hackers often use attacks like this to claim "capabilities that far exceed what they're actually capable of."

These are sometimes referred to as "perception hacks," since they allow an adversary to sow doubt about the vote totals without ever gaining the sort of access needed to actually change them.

The Minds of the Voters
The easiest targets for American adversaries, however, are the minds of Americans themselves. Influence in this realm can take a number of forms.

Last month, thousands of American voters got an email that seemed to indicate an extremist group had access to their personal data: change your voter registration, the message commanded, and support President Trump — or else.

But the email actually came from Iranian operatives, looking to sow discord, according to the U.S. government.

Misinformation, specifically about voting, also continues to spread across social media. Facebook and Twitter have added labels on some material, but it's clear that isn't putting a stop to it. One analysis found that changing the font of a message or cropping an image was all it took to bypass Facebook's defenses, reported NPR's Shannon Bond last month.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3