Hacking May Prompt Heightened US Election Security

US officials are weighing whether to designate elections as national critical infrastructure after recent hacking attacks on political groups, a move that would open up federal assistance to election officers around the country, Homeland Security Secretary Jeh Johnson said.

“We should carefully consider whether our election system, our election process, is critical infrastructure," Johnson told reporters recently at a breakfast sponsored by the Christian Science Monitor. "There’s a vital national interest in our election process."

The debate comes after hackers infiltrated the computer networks of the Democratic National Committee and the Democratic Congressional Campaign Committee in what cybersecurity experts call a broad operation by Russian operatives to infiltrate US political organizations. Hillary Clinton’s campaign said hackers also breached one of its data programs, adding that cybersecurity efforts found “no evidence” that internal systems were compromised.

The attacks, which the FBI is investigating, have spurred speculation that Russian President Vladimir Putin’s government is trying to meddle in and influence US elections, an assertion that officials in Moscow have repeatedly denied.

The breaches also revive a lingering debate over whether electronic voting systems, which have replaced paper ballots in many jurisdictions, could be hacked to manipulate the results. Republican presidential nominee Donald Trump said that he’s “afraid the election’s gonna be rigged,” although Republicans have focused mostly on potential fraud by ineligible voters.

Real Problem

Asked about the reports of Russia’s possible involvement in hacking, President Barack Obama said, “If in fact Russia engaged in this activity, it’s just one on a long list of issues that me and Mr. Putin talk about and that I’ve got a real problem with.”

Johnson said the US wasn’t yet prepared to attribute the attacks to any particular nation or group. Designating elections as critical infrastructure would put them on par with other vital national assets, such as the power grid and pipelines.

Presidential Policy Directive

White House Press Secretary Josh Earnest told reporters that members of the president’s national security team are discussing the proposal. "It’s important for the federal government to offer support to state and local governments" in their efforts, he said.

The Department of Homeland Security has the authority to designate what qualifies as critical infrastructure under Presidential Policy Directive 21 and Executive Order 13636, said Bruce McConnell, former DHS deputy undersecretary for cybersecurity. In reality, though, Johnson is vetting the proposal through the interagency process and floating it publicly to ensure it has support before making a final decision, he said.

"It’s not that they would take unilateral action but legally they have the authority to do this," said McConnell, who is now global vice president of the nonprofit EastWest Institute, based in New York.

November Election

It isn’t clear what difference such a designation would make on the upcoming November elections, as any new funding for security would have to be approved by Congress.

For this year’s elections, McConnell has recommended that DHS issue a security alert warning election officials of risks to their systems, advising them of the need to have an audit trail and paper backups, and calling on companies supplying voting machines and other equipment to go through independent audits with published results.

Designating voting systems as critical infrastructure also must be accompanied by specific ways to help state and local election official improve the security of their systems, such as through grant funding, said Larry Clinton, president of the Internet Security Alliance, a cybersecurity trade association.

"I just want to make sure nobody thinks there’s a magic wand that comes along with designating it as critical infrastructure," Clinton of the alliance said in an interview. "There has to be some actual money at the end of the pipeline."

The government could try to mandate security improvements as a condition of receiving funding, Clinton said. A better approach, he said, would be to offer incentives, as the government does to encourage states to improve the safety of highways.

Invest the Resources

"The point is, do you have an actual plan as to how to correct the problems and are you willing to invest the resources?" Clinton said. "We certainly hope this would not be more public relations than actual security."

In the short term, Johnson said he is considering working with election officials across the country with regard to what kind of “best practices” they can adopt to enhance cybersecurity.

"This is something that we’re very focused on right now," Johnson said. "There’s no one federal election system. There are some 9,000 jurisdictions across this country that are involved in the election process."

Bloomberg

 

« Banks Look Up To The Cloud
Hackers Help FBI Fight Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.