Hacking May Prompt Heightened US Election Security

US officials are weighing whether to designate elections as national critical infrastructure after recent hacking attacks on political groups, a move that would open up federal assistance to election officers around the country, Homeland Security Secretary Jeh Johnson said.

“We should carefully consider whether our election system, our election process, is critical infrastructure," Johnson told reporters recently at a breakfast sponsored by the Christian Science Monitor. "There’s a vital national interest in our election process."

The debate comes after hackers infiltrated the computer networks of the Democratic National Committee and the Democratic Congressional Campaign Committee in what cybersecurity experts call a broad operation by Russian operatives to infiltrate US political organizations. Hillary Clinton’s campaign said hackers also breached one of its data programs, adding that cybersecurity efforts found “no evidence” that internal systems were compromised.

The attacks, which the FBI is investigating, have spurred speculation that Russian President Vladimir Putin’s government is trying to meddle in and influence US elections, an assertion that officials in Moscow have repeatedly denied.

The breaches also revive a lingering debate over whether electronic voting systems, which have replaced paper ballots in many jurisdictions, could be hacked to manipulate the results. Republican presidential nominee Donald Trump said that he’s “afraid the election’s gonna be rigged,” although Republicans have focused mostly on potential fraud by ineligible voters.

Real Problem

Asked about the reports of Russia’s possible involvement in hacking, President Barack Obama said, “If in fact Russia engaged in this activity, it’s just one on a long list of issues that me and Mr. Putin talk about and that I’ve got a real problem with.”

Johnson said the US wasn’t yet prepared to attribute the attacks to any particular nation or group. Designating elections as critical infrastructure would put them on par with other vital national assets, such as the power grid and pipelines.

Presidential Policy Directive

White House Press Secretary Josh Earnest told reporters that members of the president’s national security team are discussing the proposal. "It’s important for the federal government to offer support to state and local governments" in their efforts, he said.

The Department of Homeland Security has the authority to designate what qualifies as critical infrastructure under Presidential Policy Directive 21 and Executive Order 13636, said Bruce McConnell, former DHS deputy undersecretary for cybersecurity. In reality, though, Johnson is vetting the proposal through the interagency process and floating it publicly to ensure it has support before making a final decision, he said.

"It’s not that they would take unilateral action but legally they have the authority to do this," said McConnell, who is now global vice president of the nonprofit EastWest Institute, based in New York.

November Election

It isn’t clear what difference such a designation would make on the upcoming November elections, as any new funding for security would have to be approved by Congress.

For this year’s elections, McConnell has recommended that DHS issue a security alert warning election officials of risks to their systems, advising them of the need to have an audit trail and paper backups, and calling on companies supplying voting machines and other equipment to go through independent audits with published results.

Designating voting systems as critical infrastructure also must be accompanied by specific ways to help state and local election official improve the security of their systems, such as through grant funding, said Larry Clinton, president of the Internet Security Alliance, a cybersecurity trade association.

"I just want to make sure nobody thinks there’s a magic wand that comes along with designating it as critical infrastructure," Clinton of the alliance said in an interview. "There has to be some actual money at the end of the pipeline."

The government could try to mandate security improvements as a condition of receiving funding, Clinton said. A better approach, he said, would be to offer incentives, as the government does to encourage states to improve the safety of highways.

Invest the Resources

"The point is, do you have an actual plan as to how to correct the problems and are you willing to invest the resources?" Clinton said. "We certainly hope this would not be more public relations than actual security."

In the short term, Johnson said he is considering working with election officials across the country with regard to what kind of “best practices” they can adopt to enhance cybersecurity.

"This is something that we’re very focused on right now," Johnson said. "There’s no one federal election system. There are some 9,000 jurisdictions across this country that are involved in the election process."

Bloomberg

 

« Banks Look Up To The Cloud
Hackers Help FBI Fight Cybercrime »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.