Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/6/2020
07:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

A Mix of Optimism and Pessimism for Security of the 2020 Election

DHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand and what still needs to happen to protect the integrity of November's election.

The US intelligence community thus far has not seen the concentrated, focused effort of election interference that haunted the 2016 presidential election, but that of course doesn't mean the coast is clear, according to Cybersecurity and Infrastructure Agency (CISA) director Christopher Krebs.

Krebs, who spoke at Black Hat USA yesterday about securing the 2020 election amid the COVID-19 pandemic, said the intel community is monitoring Russia, China, Iran, and North Korea for signs of targeting US infrastructure. "We see activity on a daily basis, but we can't attribute it to a specific state actor," he said. "But there's a whole lot of scanning going on."

He said he worries about ransomware threats to the election system, especially given the wave of ransomware attacks that have hit state and local government and hospitals. Krebs pointed to CISA's initiative to encourage strong security for voter registration databases, including multifactor authentication and other best practices to thwart such threats.

Visibility into the widely distributed and decentralized election infrastructure has come a long way since 2016. "We have better visibility" into the election infrastructure than in any other critical infrastructure sectors, Krebs said, mainly due to jurisdictions' wider adoption of the US Department of Homeland Security's Albert intrusion detection system monitors, which are now installed in all 50 states. In some states such as Florida, all counties have an Albert IDS, he said.

"But there's more to do. We have to continue preparing for a capable, disruptive actor," he said.

Krebs said the recent statement by the Office of the Director of National Intelligence warning about election interference efforts against the US by China, Iran, and Russia, was just "the beginning of a conversation with the American people about these threats and risks" and that more details are still to come.

Meanwhile, the US State Department this week announced it will offer a reward of up to $10 million for information that leads them to a person who engages in online election interference on behalf of a nation-state. "Persons engaged in certain malicious cyber operations targeting election or campaign infrastructure may be subject to prosecution under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, which criminalizes unauthorized computer intrusions and other forms of fraud related to computers. Among other offenses, the statute prohibits unauthorized accessing of computers to obtain information and transmit it to unauthorized recipients," State's media alert said.

Paper to the Rescue?
Another big piece of the 2020 election landscape: paper, as in paper backup and paper ballots.

"One of the best risk mitigation techniques right now is paper," CISA's Krebs said. "We need analog backup at all levels."

Paper ballot backups will be more widely deployed this year than in the 2016 election, thanks to a major effort over the past few years to update voting systems to record backup paper ballots, such as optical scanning systems.

"In 2016, 80% of votes cast had a paper record associated with it. In 2020, we're on track for 92%, and we might even do a little bit better" than that, he noted.

COVID-19 has added a new dimension to election security, with a greater demand for paper ballots as some states look to make absentee voting more available so voters have the option of mailing in their vote rather than risking exposure to the virus at public polling sites.

"There's reasons to be optimistic and pessimistic" about the security of the 2020 election, Matt Blaze, McDevitt chair in computer science and law at Georgetown University, said in his keynote address at Black Hat.

The nation has less than 100 days to prepare for a possible major uptick in mail-in voting, he said. "We need to prepare for a wide range of scenarios... print lots of ballots that we may not use and provide a lot of in-person voting under pandemic conditions," he said, which some underfunded jurisdictions won't be able to pull off in such short order.

It's unclear how paper voting could be scaled in the pandemic. Blaze points to the multi-layered process that goes into absentee/mail-in vote-counting. "This is a pretty labor-intensive process, sending the ballots out and processing the marked ballots ... with checks by multiple people," he says. And if the signature on the envelope doesn't match the registered voter's signature on record, election officials have to contact the voter to further verify the ballot.

Kiersten Todt, managing director of the Cyber Readiness Institute, said localities should be testing their election processes now to be prepared for any adversarial activity, whether it's cyberattacks or misinformation/disinformation campaigns. "Even with mail-in ballots, how is this going to be managed? We've got to be testing what it's going to look like on election day."

The recent Twitter hack should serve as a wakeup call for the major role the social media platform and others plays in the nation's economy and security, according to Todt. "They should be treated as critical infrastructure and they need to be working more collaboratively with government, and government [needs] to be doing a better job with industry."

Georgetown's Blaze said the cybersecurity community can play a key role in solving some of the election security challenges. "On an optimistic note, we can do this. We need to engage now," he said.

"This is a call to arms: this community is the one whose help among others is going to be needed ... by local election officials," he said. Look for how to help, as a poll worker or an IT expert, for example. "We have to all take responsibility for this."

 Related Content

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27660
PUBLISHED: 2020-11-30
SQL injection vulnerability in request.cgi in Synology SafeAccess before 1.2.3-0234 allows remote attackers to execute arbitrary SQL commands via the domain parameter.
CVE-2020-27659
PUBLISHED: 2020-11-30
Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile parameter.
CVE-2020-29127
PUBLISHED: 2020-11-30
An issue was discovered on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. After logging into the portal as a root user (using any web browser), the portal can be accessed with root privileges when the URI cgi-bin/csp?cspid=&csppage=cgi_PgOverview&csplang=en is visit...
CVE-2020-25624
PUBLISHED: 2020-11-30
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...