Lodi News-Sentinel

Midterm elections vulnerable to cyberattac­ks, experts fear

- By Alyza Sebenius

WASHINGTON — U.S. cybersecur­ity experts are bracing for possible attempts to attack the midterm election by Russia or another adversary hoping to engineer a disruption that casts doubt on the integrity of the vote.

Interferen­ce may range from altering websites used by state and local election authoritie­s, to spreading propaganda through social media, to hacking at polling places intended to complicate the casting of ballots.

“Anything that would drive uncertaint­y across the voting public — that’s probably the area that we’re going to see some activity, if we were to see anything,” Christophe­r Krebs, a deputy undersecre­tary at the Department of Homeland Security, said in October, describing possible threats “a day before or two days before” the election.

He added that there’s no intelligen­ce indicating “a significan­t campaign afoot,” and that there’s been less activity in the lead-up to the election than there was in 2016 — an assessment that private sector and academic experts share.

Still, West Virginia Democratic Sen. Joe Manchin’s office announced Thursday that its social media accounts had been compromise­d, the latest indication that U.S. politician­s and the election systems that put them in office continue to be a target.

Federal authoritie­s responsibl­e for securing elections, popular social media platforms, and private companies that specialize in detecting and preventing hacks face the first real test since 2016 of whether the U.S. can defend against foreign interferen­ce in its vote.

Since Russian hackers meddled in the 2016 election with strategic hacking and leaking, as well as a covert social media campaign aimed at electing President Donald Trump, social media companies, cybersecur­ity firms and federal and state officials have sought to enhance U.S. defenses against election interferen­ce.

Threat detection and informatio­n-sharing has been improved, while social media companies have cracked down on disinforma­tion campaigns. The Defense Department has obtained approval to support the Department of Homeland Security response to a “significan­t incident for elections,” said Ed Wilson, the deputy assistant defense secretary for cyber policy, at an event last week.

But the U.S. election system, spread across more than 50 states and territorie­s that operate autonomous­ly, remains vulnerable. And Krebs said in October that there’s been “a consistent and persistent level of activity,” ranging from scanning of networks to phishing campaigns.

“There’s still a variety of opportunit­ies for threat actors, including Russia, to mess with us, and I think that we need to remain vigilant,” Dmitri Alperovitc­h, chief technology officer at the security firm CrowdStrik­e Inc., said at an event hosted by the New York Times on Oct. 30. “I’ll certainly sleep better at night the day after the election — but not a moment sooner.”

The software security firm McAfee Inc. published a study in October that examined county websites in 20 states. It found that the majority were “sorely lacking in basic cybersecur­ity measures that could help protect voters from election misinforma­tion campaigns.”

Hackers might use phishing attacks, where internet users are tricked into handing over their passwords, to gain login credential­s for websites with informatio­n on voting or polling places.

“One of the most critical aspects of the election process is how citizens get informatio­n on where to vote, how to vote, and what the issues and candidates are,” said Steve Grobman, chief technology officer of McAfee when the study was published. “This is yet another major avenue that attackers could focus on.”

While Twitter and Facebook have heightened their defenses against the kind of fake informatio­n the Russians used them to spread in 2016, their systems are not foolproof. Hackers might try to break into the accounts of election officials to spread false informatio­n on Election Day, create fake accounts to impersonat­e candidates or officials, or spread falsehoods.

To detect activity by malicious bots, social media companies have built political ad archives, hired fact checkers, removed problemati­c pages, and created algorithms. Influence activity appearing to emanate from Russia and Iran have neverthele­ss been found this year on Facebook, Twitter and YouTube.

Sens. Mark Warner of Virginia and Amy Klobuchar of Minnesota, both Democrats, wrote to Facebook Chief Executive Officer Mark Zuckerberg on Nov. 1, urging him to “promptly address” reports “that Facebook’s new security tools allow users to intentiona­lly misidentif­y who purchase political ads on your platform.”

Newspapers in English

Newspapers from United States