Chattanooga Times Free Press

Officials were told system had problems before ’16 election

- BY GREG GORDON, CHRISTINE CONDON AND STANLEY DUNLAP

GEORGIA ELECTION SECURITY

WASHINGTON — Georgia election officials got a friendly warning in August 2016 that their electronic voting system could be easily breached.

But less than a month before the November election, a state cybersecur­ity official fretted that “critical vulnerabil­ities” persisted, internal emails show.

The emails, obtained through a voting security group’s open records request, offer a glimpse into a Georgia election security team that appeared to be outmatched even as evidence grew that Russian operatives were seeking to penetrate state and county election systems across the country.

“I am sure that you are aware that these are opportunit­ies for malicious users to gather account credential­s,” William Moore, a cybersecur­ity official on a Kennesaw State University team tasked with running Georgia’s election system, wrote to a colleague in October.

Officials at Kennesaw State’s Center for Election Systems were struggling to respond to the report of a cyber watchdog who nosed around the system to test its defenses two months earlier and wound up gaining access to a colossal, 15-gigabyte store of confidenti­al material, including voter data and passwords to the system.

The disclosure­s add to alarms about the security of Georgia’s elections — not only in 2016, but also heading into this fall’s midterm elections.

“I think these emails reveal that they recognized this system was catastroph­ically insecure,” said Robert McGuire, a Seattle lawyer representi­ng citizen activists in a lawsuit that seeks to force Georgia to scrap its paperless electronic voting machines this fall and shift to paper ballots.

Secretary of State Brian Kemp, whose office oversees the state’s elections, says he was unaware of the system vulnerabil­ities at the time. Kemp, the Republican nominee for governor in this fall’s election, still maintains Georgia’s system is secure.

However, Kemp has created a commission with members of both parties to examine how to replace the state’s voting system in time for the 2020 election.

McGuire said cyber experts refer to the breach of the center’s Drupal servers as “Drupalmage­ddon,” a condition that “would let a malicious person take over as administra­tor of that server, like you had the root password.

“It means they could be sitting at the keyboard with access to everything … They could write stuff, change stuff, take stuff off,” he said.

The emails show that, even in March 2017, months after the election, the center’s technical team was still scrambling for solutions when a second Georgia cybersecur­ity expert visited Kennesaw State’s electronic mothership for the state’s 159 county election systems. He, too, reported gaining access to confidenti­al records on millions of voters.

Continuing revelation­s about the system’s security challenges have forced Kemp to confront a storm of questions, both about his stewardshi­p of Georgia’s election system while serving as secretary of state since 2010 and about the Kennesaw State center’s destructio­n of records in the face of a citizen lawsuit.

Georgia, along with four other statewide systems, uses aged electronic voting machines that lack a paper trail for use in recounts or audits to verify the accuracy of the reported vote.

As a result, experts say, the system may be an inviting target for operatives from Russia and elsewhere to install software that manipulate­s votes without detection.

During a White House briefing on Thursday, Homeland Security Secretary Kirstjen Nielsen said U.S. adversarie­s — presumably including the Kremlin — have exhibited “a willingnes­s and a capability” to go beyond Russia’s sophistica­ted social media blitzes and email hacks of 2016 and this time penetrate America’s election infrastruc­ture, including voter rolls and voting machines.

A federal indictment issued July 13 by Justice Department special counsel Robert Mueller underscore­s the threat to Georgia. It alleges that Anatoliy Kovalev, one of a dozen

“This pattern of reckless behavior is exactly why we are ending our relationsh­ip with KSU …” — GEORGIA SECRETARY OF STATE BRIAN KEMP

Russian intelligen­ce officers charged with hacking Democrats’ emails and attempting to penetrate state voter registrati­on systems, scoped out Georgia county election websites in October 2016 “to identify vulnerabil­ities.”

Homeland Security officials notified Kemp’s office that websites for Fulton and Cobb counties, covering Atlanta and its outskirts, were among those visited, said Kemp spokeswoma­n Candice Broce, confirming a report by the Atlanta Journal-Constituti­on.

“There is no evidence that he [Kovalev] did anything except visit these websites,” perhaps to identify employees who might be tricked into providing passwords to their systems, Broce said.

Kemp has sought to distance himself from Kennesaw State’s center, whose contract he cut short in October 2017 when it was disclosed center officials had wiped its election system server and a backup clean.

He responded with a Facebook post to the disclosure that the servers were wiped, saying Kennesaw State officials never notified his office of the server’s vulnerabil­ities or of plans to destroy documents. He assailed the center for “undeniable ineptitude.”

“This pattern of reckless behavior is exactly why we are ending our relationsh­ip with KSU” and moving the job “in-house,” mirroring the arrangemen­t in most other states, Kemp said.

At the time the server data was erased, center officials were defendants in a federal lawsuit over the system’s security gaps for which relevant records should have been preserved. In addition, they were subject to a federal law banning the destructio­n of voting records for 22 months after elections.

“The timing of the server being destroyed is suggestive that they intended for us not to know what’s on there,” said lawyer McGuire, who said he is a Republican. “Circumstan­tially, why would you destroy something right when you’ve been served with a lawsuit?”

Marilyn Marks, a North Carolina-based voting security activist who has led the challenge to Georgia’s election integrity, said that if Kemp “was unaware of the massive security failures, breaches and compromise­s of the election system … he was either grossly negligent or willfully blind.”

Another Kemp critic is Richard DeMillo, a former chief technology officer for Hewlett Packard and past dean of Georgia Institute of Technology’s computer science school.

He said Kemp’s office “is prone to misreprese­nting the security posture of Georgia’s election system, to saying things that have been demonstrat­ed to be false and to offering misleading explanatio­ns to why Georgia voters should trust the security of their systems.”

For some 15 years, Kennesaw State ran Georgia’s elections from a low-slung brick building DeMillo likened to operating “out of someone’s basement.” There were no bars on the windows, and the front door had no special security, he said.

A Politico magazine story published in June 2017 suddenly focused national attention on Kennesaw State’s Center.

The story described how Logan Lamb, a young online security researcher for Bastille Networks, visited the center’s website in August 2016 and found he could easily download 6.7 million voter registrati­on records.

Lamb emailed the election center’s executive director, Merle King, and reported that the voting system’s software and other documents were “completely open.”

“There’s a strong probabilit­y that your site is already compromise­d,” he wrote. “I’d like to collaborat­e with you on securing our state’s election system’s infrastruc­ture against wireless attacks.”

The next day, the emails show, the center’s No. 2 official, Michael Barnes, wrote of blacklisti­ng Lamb from accessing the website before changing his mind and ordering scans on the system.

Within hours, Steven Dean, the center’s technical coordinato­r, joined in expressing concerns about the system’s security.

“We have spent the last several years simply maintainin­g it in the order it had been working previously,” he wrote. “Obviously, this has become untenable in the current atmosphere, and [we] … must learn more to get the security of the website under control.”

In September, as the problem of reconfigur­ing the server became more complex, Dean wrote to his colleagues at Kennesaw State: “We’ve discovered we’re a little out of our depth.”

DeMillo said that once Lamb alerted the center of the breach, officials should have notified Kennesaw State’s far more skilled chief informatio­n officer, whose staff “should have descended on the system” and “would have known what to do.”

Kennesaw State officials did not immediatel­y respond to requests for comment.

The emails show that center officials instead conducted security scans of their servers to try to detect the vulnerabil­ities. Their findings included search engines such as Google had stored links to some of the center’s documents.

When Lamb’s friend, Christophe­r Grayson, confirmed the same vulnerabil­ities in March 2017, he reached out to a Kennesaw State University lecturer on informatio­n security, Andy Green.

Green phoned the center and warned in an email that the security shortcomin­g could allow outsiders to access important files without authentica­tion, including Social Security and driver’s license numbers.

Shortly thereafter, Stephen Gay, the university’s chief informatio­n security officer, confirmed that millions of records on Georgia voters were open to the public.

“Understand­ing the risk associated with this vulnerabil­ity, we have closed all firewall exceptions for elections.kennesaw.edu,” a way of shutting off access, Gay wrote.

This time, the FBI was alerted. Bureau agents took possession of the servers and investigat­ed for more than two weeks.

Their investigat­ion yielded no data that “escalates to the point of breach,” according to an incident report from Kennesaw State’s informatio­n security office. The emails indicate the FBI possessed a forensic image of the server.

On March 31, 2017, university officials said in a statement that “no personal informatio­n was compromise­d.”

Broce said the system has been regularly tested and, “there is no evidence that any component has been compromise­d, but we continuall­y monitor for that and have contingenc­y plans in place in the event something does occur.”

“We do not take election security for granted,” she said.

Newspapers in English

Newspapers from United States