Foreigners Could Hack US Elections, Experts Say

Photo credit: Voting Process adapted from U.S. Government Accountability Office / Flickr

What if a foreign head of state had the power to handpick our next President? It sounds like the plot of a movie, but it actually might be in the realm of possibility.

Most people take our elections for granted. The few who don’t often suspect that one party might be trying to steal votes from the other. But they don’t envision that the theft could be coming from outside US borders.

What experts are telling us, though, is that our voting machines are so insecure that all elections, whether at the national, state, or local level, are vulnerable to being attacked by hackers in other countries.

Chinese and Russian hackers, for instance, have reportedly breached government databases. The government of Israel has been accused of espionage against the US and of hacking in France. And tech giants like Google and Sony have been attacked successfully in the past. Indeed, it’s been proven that everything from cars to sniper rifles to traffic lights can be broken into.

Certainly there would be a massive interest abroad in manipulating US elections.

For example, Russia may want to prevent a hawk like John McCain, who wants weapons in the Ukraine and faces a tough battle for his job next fall, from getting reelected.

Israel’s leaders believe that the Iran nuclear deal would doom their country, so if they thought they could get away with it, would they try to put in office US representatives who share that view?

And if China wanted to undermine trade deals like the Trans-Pacific Partnership (TPP), the Trade in Services Agreement (TiSA), and the Transatlantic Trade and Investment Partnership (TTIP), which are seen by some as attempts by the United States to encircle and maintain dominance over that emerging Asian power, it could swing elections for legislators who have come out against such trade pacts.

This begs the question: Given that the security at some of our most protected institutions can be breached, and given that US elections pose an enticing target for our adversaries, what would prevent a foreign agent from hacking our ballot boxes?

The answer: Not much.

Experts indicate that the election systems in place today do not provide the adequate protection that would be able to stop a foreign hacker — a hacker anywhere, in fact — from rigging our races. Even worse, these attacks could go undetected.

It’s difficult for computer scientists to pinpoint exactly how many programmers around the world are capable of remotely breaching an election software — whether that’s the vote itself or other related data — like voter registration records. However, many agree that the intellectual barrier is not significant.

Since such attacks can easily go unnoticed, evidence of remote hacks is scarce. But it’s likely they’re happening more than we know, considering that unencrypted connections over the open internet aren’t too hard for a knowledgeable college student to breach.

Thus, it’s conceivable that anyone around the world with a somewhat advanced knowledge of computers is able to peer into our electoral machinery and potentially compromise our votes.

Weaknesses in Internet Voting

Each state conducts its own system of voting, and some election protocols are more secure than others. That said, all modes of computerized voting are subject to being compromised.

Take internet voting, also known as iVoting, which allows citizens to vote through an online portal or by e-mail or by fax. If not encrypted properly, these transactions could be compromised.

Jonathan Katz, Director of the Maryland Cybersecurity Center at the University of Maryland, College Park, observes that even if a system appears safe, voting online allows hackers to examine the system for points of vulnerability.

“I wouldn’t necessarily go so far to say that everything done over the internet is insecure, but you are certainly opening yourself up to the potential for hackers to look at your system and try to find vulnerabilities,” Katz told WhoWhatWhy.

Since 2000, numerous computer and voting experts, including the National Science Foundation, have authored studies warning about the serious vulnerabilities of iVoting. Some of these studies cite unsuccessful internet voting systems that have been implemented in such countries as Estonia, France, and Norway.

One report, produced by computer scientists at the request of the Pentagon, examined a pilot iVoting project and concluded that an internet- and PC-based voting system presented “fundamental security problems” that couldn’t be fixed without a “radical breakthrough.”

Cyber attacks, the report concluded, “could occur on a large scale, and could be launched by anyone from a disaffected lone individual to a well-financed enemy agency outside the reach of U.S. law.”

Thus, the pilot program in question was cancelled. Yet various forms of iVoting remain in place in over 30 states, despite its vulnerabilities.

Weaknesses in Electronic Voting

Even electronic voting, or eVoting, in which the machines are ostensibly not connected to the worldwide web, poses significant risks to an election’s integrity.

Some states use direct recording electronics (DREs), wherein voters use a push-button or touchscreen machine to directly record their choices. The votes are then recorded on some sort of media, then tallied later. Other states use optical scan equipment, in lieu of hand counting, to scan and total the paper ballots. (Check to see what equipment is used at your polling place.)

Despite its seemingly safe appearance, there are subtle ways the eVoting process could be susceptible to attack. For, in many cases, these systems actually do connect online.

John Sebes, CTO of the Open Source Elections Technology Foundation (OSET), told WhoWhatWhy that the most significant logistical issue for local officials is something called the election management system, or EMS.

As a component of the overall apparatus, the EMS is used for election data management and data entry — most likely on a PC in an elections office. Sebes said that, in theory, EMSs are never supposed to be online, but sometimes they get connected anyway. Not only do hackers then have the potential to breach election data on the PC, but malware could affect the removable media when it is taken out of the PC and inserted into the voting machines.

“Anytime you have a breakdown of safe computing around a workstation that’s running an EMS, that’s a really significant threat,” contended Sebes. The risk is multiplied, he said, when these systems run on old versions of Windows, which have significant vulnerabilities.

Sometimes vendors will send software updates to patch a machine through an EMS via the internet. Other times vendors can directly update their machines through a dial-up connection. Once votes are cast, electronic ballots can be sent via an online connection to central tabulators that tally the results. Since all of these transactions involve the internet, the same threats that apply to iVoting also apply here .

Maryland Cybersecurity Center’s Katz noted that if one part of a system is vulnerable and has unsecured connections, hackers who gain access to its inner workings could open up elections to cyber attacks.

“I think that the big problem here is this: It’s not just about devising a secure protocol,” Katz said. “It’s about making sure that the entire ecosystem of all of parts that have to work together are all secure. And that seems right now to be very difficult to do.”

In addition, vulnerabilities in the “ecosystem” are not limited to internet-related issues. The range of problems includes weak passwords, physical insecurity of the machines, and inadequate post-election audits.

Though “it seems kind of far-fetched,” Sebes observed, to think that “significant state-sponsored adversaries who are busy pillaging personnel databases of federal and large data organizations would bother to do a similarly targeted attack on a locality that accidentally had an EMS connected to the internet,” nonetheless such an attack cannot be ruled out. “As we’ve seen in the past couple months,” he said, “it’s really hard to assess the likelihood of attack from really sophisticated adversaries.”

And without a paper trail (as is the case with some DREs), there is no way of knowing an attack ever took place.

The Vendors

What about the track records of the voting vendors that are running our elections? How are they trying to mitigate these threats and how do they stack up next to the security of other organizations — the US Department of Defense or Microsoft Corp., for example?

They don’t.

According to Greg Miller, chair of the OSET Foundation, both the software and the machines used by these vendors are massively outdated.

“By and large, the hardware that’s been relied upon since 2005 for these voting systems is just no longer made,” he said.

Similarly, noted Miller, the software that runs on many of these machines is no longer supported. Moreover, some software upgrades are not even possible on the outdated hardware, which do not have capacity to run the advanced programs.

Despite continuous warnings from experts about election insecurities, officials still rely on vendors that refuse to disclose how their machines run, deeming their code “proprietary.”

The three largest voting vendors in the United States — Electronic Systems & Software, Dominion Voting Systems, and Hart Intercivic — did not respond to requests for comment.

The Alternative

“If you can breach Pentagon security, you’re clearly going to be able to breach internet voting security,” election activist Bob Fitrakis told WhoWhatWhy. “It seems like an obvious way in which to influence American politics. I think the logical thing is to go back to paper ballots, which most of the democratic world use, and count them at the precincts. That’s probably what needs to be done more than anything.”

In recent years, computer scientists, activists, whistleblowers and privacy experts have been calling for an end to the election status quo. They contend that hackers all over the world pose a significant threat to the integrity of our ballots and that this flimsy system creates the context for the mounting evidence of election fraud that has been uncovered.

The legitimacy of the US political process rests squarely on these machines. Even if manipulation by foreign agents were not happening today (and we would have little way of knowing if it were), just the threat of hacking should be cause for deep concern. And that’s not even taking into account the possibility that foreign and domestic agents alike could be physically breaching the voting systems — something even easier than a remote hack.

“This is a national security issue, because it is an issue of fundamental rights that goes to our human security,” said Joe W. “Chip” Pitts III, a lecturer at Stanford Law School. “If that infrastructure of freedom and democracy is not secure, none of us are secure.”

Related front page panorama photo credit: Voters (Maryland GovPics / Flickr), Laptop user (Indi Samarajiva / Flickr), Vote by mail (Marlon E / Flickr)

Where else do you see journalism of this quality and value?

Please help us do more. Make a tax-deductible contribution now.

Our Comment Policy

Keep it civilized, keep it relevant, keep it clear, keep it short. Please do not post links or promotional material. We reserve the right to edit and to delete comments where necessary.

print

9 responses to “Foreigners Could Hack US Elections, Experts Say”

  1. (Comment by reader @RalphHornsby) Ha! RNC did it during the 2012 GOP primaries!

  2. Anonymous says:

    There is technology out there called VotRite that does touch screen voting machines that is offline. Very forward thinking and there is talk about using them in NYS.

    • PecosinRat says:

      New York would be foolish to use them when paper ballots and pens are much cheaper, can be easily audited for accuracy, are certainly more secure when precinct-level counting and results-posting are done, and can actually make election lines move much faster. In spite of our love of gadgets, this is one place where security and transparency are paramount.

  3. PecosinRat says:

    One might get the impression from this article that connection to the Net is the most danger our election systems are exposed to. However, the reality is that proximity to a single voting machine can result in compromising an entire election district (a county, for example). ES&S voting machines like the ones used in the large urban district where I live) have been identified by the State of Florida as having a password “backdoor” installed by the manufacturer that would allow anyone having it to bypass local passwords and take over the machine. Further, testing by professional “red teams” employed by the Ohio Secretary of State’s office demonstrated that, once in the machine, planting a virus that moved itself to and silently took over the central election counting machine was easily accomplished. And, private access to a machine isn’t that hard either. Since it takes some time to move over 1,500 machines to 450 polling places here, machines are often stored in a church or school for weeks before an election. Election authorities will tell you that the machines are locked and sealed with security tape as a precaution against being hacked while in these less-than-secure locations. However, audits of election day tech logs here indicates that when security tapes are broken, the election officials simply run a “logic and accuracy” test (a pre-installed testing process easily avoided by hackers) and, if the machine passes it, allow the machine to be used in the election anyway. In spite of knowing these problems exist, our local election leaders have chosen to ignore them, even though the use of paper ballots has been demonstrated to be cheaper and faster (through-put, many more pens can be in use at the same time than expensive electronic voting machines) than the use of these machines.

  4. Virginia Martin says:

    Columbia County, New York hand-counts its op-scanned ballots. Every one of them. We’ve been doing this since the opscan voting machines were introduced in 2010. There’s nothing terribly complicated about it, it doesn’t take all that long, and it doesn’t cost very much. All the voters in our county can be really, really certain that the vote count is accurate. They can come and watch, if they like. It took a couple of elections for us to hone our procedures, but hone them we did, and we’re more than happy to show other counties how we make it work.

    Nobody’s going to hack Columbia County and get away with it.

  5. FiuToYou says:

    Pen, Paper, Count, very simple. And last but not least, use 100% popular vote! Get rid of the unbelievably corrupt ‘Electoral College System’!!!! Let the people vote for their leaders. Imagine if Bush had never been President. We’d be living in a much better world, that’s for sure!

  6. Clark says:

    “It’s not the votes that count,it’s who counts the votes.”
    — Josef Stalin —

    “We are not going to achieve a new world order without paying for it in blood as well as in words and money.”
    Arthur Schlesinger, Jr., in Foreign Affairs (July/August 1995)

    “The world is governed by personalities very different to what people that cannot see further than their eyes, believe”
    – Benjamin Disraeli – (British Statesman)

    “Behind the October Revolution there are more influential personalities than the thinkers and executors of Marxism”
    – Lenin –

    “The one who cannot see that on Earth a big endeavor is taking place,an important plan, on which realization we are allowed to collaborateas faithful servants, certainly has to be blind”
    – Winston Churchill – (33 Degree Freemason)

    “… in politics nothing is accidental. If something happens, be assured it was planned this way”
    – Franklin D. Roosevelt – (32 Degree Freemason)

    We shall unleash the Nihilists and Atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effects of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will be from that moment without compass, anxious for an ideal, but without knowing where to render its adoration, will receive the pure doctrine of Lucifer, brought finally out in the public view, a manifestation which will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time.
    Illustrious Albert Pike 33°
    Letter 15 August 1871
    Addressed to Grand Master Guiseppie Mazzini 33°
    Archives British Museum
    London, England

  7. Title

    […]always a massive fan of linking to bloggers that I enjoy but do not get a great deal of link really like from[…]

  8. Termie says:

    The plot sickens– No real mention of the fact open source systems are ready to solve this crisis. OSET is cited and continue to plague the real pioneers of open source election security by impersonation games.. and donating massive monies to politicos.. and then there’s Fitrakis with Putin and Stein — We have our work cut out for us.