Voting Security: Did Your Vote Count?

Voting Security: Did Your Vote Count?

The most recent elections is the most secure in the nation’s history. Or, is it? Government officials say it is the most secure ever.

Fewer voters are set to use the riskiest machines — electronic systems that leave no paper record — as compared to four years ago, and there is a whole-of-government approach to election security that never existed before.

"My confidence in the security of your vote has never been higher," said Chris Krebs, the director of the Department of Homeland Security's cybersecurity arm, in an election security video featuring a number of top national security officials released last month.

The same vulnerabilities exposed in Russia's attack on the 2016 election have not disappeared. Security experts have recommended that the United States spend billions of dollars to improve systems nationwide. Congress didn’t see it that way, allocating only a fraction of that.

And while social media companies have worked to control influence operations and lies that spread on their platforms, the federal government has declined to regulate those changes. Experts say bad information is still spreading rapidly online — helped by many Americans users who have helped to sustain the explosion of questionable material.
Article continues after sponsor message

Now, four years removed from an election that the intelligence community and bipartisan congressional committees agree was marred by an unprecedented level of interference, the U.S. is set to conclude another round of voting on Tuesday.

The Votes Themselves
Many Americans remain worried about the possibility that a foreign adversary could manipulate vote totals, there is no evidence this has ever happened in an American election — even in 2016 when Russian attackers were able to hack into the registration databases of a number of states.

Experts agree that actual votes would probably be the most difficult part of an election to successfully hack. The problem has only gotten tougher. In 2016, nearly 28 million voters cast ballots that did not have a corresponding paper trail: a major cybersecurity red flag.

This year, that number may be less than 10 million. Eliminating the paperless machines makes it more difficult for a cyberattack to affect votes and go undetected.

In many jurisdictions, including the state of Georgia, officials replaced their paperless machines with machines that print out a piece of paper that allows the voter to verify their selections before the ballot is counted.

This gives the voter the ability to vote using the machine, but then also to check to make sure their vote was recorded accurately.

The problem is, research suggests only a small number of voters actually check the paper the machine prints out, making it questionable at best whether an attack that changes voter selections actually would be caught by this method.

Audit Trail
The way officials can demonstrate that, Stark says, is through public auditing, a process that not every state uses. Even among the states that do some sort of audit, only a few do what are considered the "gold standard" of post-election audits, called risk limiting audits.

Proposed legislation from Sen. Ron Wyden (D-OR) to mandate such audits nationwide, but election reforms have gained little to no traction with the Republican-controlled Senate.

The Bottom Line
Your 2020 vote is almost certainly safe, but some security experts won't be fully satisfied until the majority of votes are hand-marked, and the auditing process is advanced and rigorous enough to validate the results.

Considering the disparate nature of U.S. elections, that reality is still a ways away.

Hacks that Don't Touch the Results
While actually affecting the vote totals remains difficult, other aspects of election infrastructure, like websites that post-election information, are significantly more vulnerable.

Many local governments haven't taken simple steps that would make it more difficult for attackers to set up fake websites to post fake results, for instance.

Cybersecurity and Infrastructure Security Agency officials said at a briefing last week that he expects attackers to try to target election websites to either deface them, or just shut them down for a period of time. Hackers often use attacks like this to claim "capabilities that far exceed what they're actually capable of."

These are sometimes referred to as "perception hacks," since they allow an adversary to sow doubt about the vote totals without ever gaining the sort of access needed to actually change them.

The Minds of the Voters
The easiest targets for American adversaries, however, are the minds of Americans themselves. Influence in this realm can take a number of forms.

Last month, thousands of American voters got an email that seemed to indicate an extremist group had access to their personal data: change your voter registration, the message commanded, and support President Trump — or else.

But the email actually came from Iranian operatives, looking to sow discord, according to the U.S. government.

Misinformation, specifically about voting, also continues to spread across social media. Facebook and Twitter have added labels on some material, but it's clear that isn't putting a stop to it. One analysis found that changing the font of a message or cropping an image was all it took to bypass Facebook's defenses, reported NPR's Shannon Bond last month.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3