Milwaukee Journal Sentinel

IS OUR ELECTION SYSTEM SAFE?

How hackers might attack Wisconsin’s elections

- Grigor Atanesian

Aprivate vendor inadverten­tly introduces malware into voting machines he is servicing. A hacker hijacks the cellular modem used to transmit unofficial Election Day results. An email address is compromise­d, giving bad actors the same access to voting software as a local elections official. These are some of the potential vulnerabil­ities of Wisconsin’s election system described by cybersecur­ity experts.

State officials insist they are on top of the problem and that Wisconsin’s elections infrastruc­ture is secure because, among other safeguards, voting machines are not connected to the internet and each vote is backed by a paper ballot to verify results.

In July, the Wisconsin Center for Investigat­ive Journalism reported that Russian hackers have targeted websites of the Democratic Party of Wisconsin, the state Department of Workforce Developmen­t and municipali­ties including Ashland, Bayfield and Washburn. Elections in this swing state are administer­ed by 1,853 municipal clerks, 72 county clerks and the Wisconsin Elections Commission.

Top cybersecur­ity experts from the United States, Canada and Russia interviewe­d by the center said that some practices and hardware components could make voting in Wisconsin open to a few types of malicious attacks and that Russian actors have a record of these specific actions.

And it is not just Wisconsin — this is a nationwide threat, the National Academy of Sciences, Engineerin­g and Medicine stated in its newly released report, Securing the Vote.

“With respect to foreign threats, the challenge is compounded by the great asymmetry between the capabiliti­es and resources available to local jurisdicti­ons in the United States and those of foreign intelligen­ce services,” according to the report.

Wisconsin Elections Commission spokesman Reid Magney said the agency has been doing “almost everything they recommend” in the report for several years except for a specific type of post-election audit, which will be discussed at a Sept. 25 meeting.

“In short, we’re way ahead of the curve in election security and ought to get some credit for that,” Magney said.

Vendors source of concern

Private companies, which supply the hardware and software for voting, are increasing­ly the focus of federal lawmakers, security experts and election integrity advocates.

Former longtime Legislativ­e Audit Bureau manager Karen McKim, a coordinato­r for the Madison-based grassroots group Wisconsin Election Integrity, said many Wisconsin elections officials do not realize “how very much is completely outside their control.”

“They really, truly, do believe that if they keep the individual voting machines unconnecte­d from the internet and do pre-election testing, that the software is safe,” said McKim, whose group advocates for measures to secure Wisconsin’s elections.

Voting machines are certified by the state. But there are no federal standards for security, operation or hiring processes at companies that provide hardware and software for voting. The state does not scrutinize the security practices of such private vendors.

“While (outsourcin­g pre-election programmin­g) may introduce

a vulnerabil­ity, the more important question is whether that vulnerabil­ity is acceptable,” Magney said. “And that depends on the exact details of the security mitigation­s involved.”

Dane County Clerk Scott McDonell said large counties in Wisconsin such as his “typically code their own elections,” but “the small ones are outsourcin­g.”

“If I were being paranoid,” he added, “I would worry about the outsourced ones.”

Cybersecur­ity expert Luke McNamara confirmed that private vendors can be a vulnerabil­ity. McNamara is a senior analyst at the California-based FireEye cybersecur­ity firm, which investigat­ed the breach of Illinois’ voter registrati­on database that happened before the 2016 election.

He said government­s need to make sure the vendors they work with “are using proper security and safeguardi­ng their own software, data and systems that they’re deploying out to the state level.

The Green Party’s presidenti­al candidate, Jill Stein, who won the right under state recount law to evaluate the source code for Wisconsin’s voting machines, is advocating for public ownership of voting systems and technologi­es related to them.

“It’s outrageous that our election systems are owned by private corporatio­ns that claim a proprietar­y interest in keeping critical informatio­n secret from the public,” Stein campaign spokesman Dave Schwab wrote in an email to the center.

Computer scientist J. Alex Halderman, who was part of the team that pushed for the 2016 recount of the presidenti­al vote in Wisconsin, told the U.S. Senate Intelligen­ce Committee that private vendors can make elections systems vulnerable.

“Attackers could target one or a few of these companies and spread malicious code to election equipment that serves millions of voters,” Halderman, director of the University of Michigan’s Center for Computer Security and Society, testified in 2017.

Wisconsin Election Integrity activists have sought transparen­cy from Command Central LLC, a Minnesotab­ased vendor that has provided voting machine programmin­g to more than half of Wisconsin’s 72 counties. In a 2011 email interview with local activists, a company representa­tive said it serviced “3,000 pieces of equipment” in 46 Wisconsin counties.

The center asked Command Central several questions, including the number of government­s it currently serves in Wisconsin, what technology it uses to exchange files with clerks and whether there are any full-time security personnel in the company.

“We do not disclose informatio­n to

the press (or the public) about internal and external procedures with our customers or the specifics of our internal security settings/applicatio­ns,” Command Central President Chad Trice wrote in response.

Two corporatio­ns that supply most of the voting machines in Wisconsin, Election Systems & Software of Omaha, Nebraska; and Dominion Voting Systems of Denver, are suing the state Elections Commission and the Stein campaign in Dane County Circuit Court in Madison over the campaign’s plans to evaluate voting software used in the 2016 presidenti­al election. The companies argue that any public disseminat­ion of the findings would jeopardize “highly confidenti­al, proprietar­y and trade secret informatio­n.”

Removable memory devices debated

Another potential vulnerabil­ity is the use of removable devices to transfer programmin­g to the voting machines. If such a device contains malicious software, it can infect even voting machines not connected to the internet, said Alexis Dorais-Joncas of the cybersecur­ity firm ESET, who investigat­ed just such an attack by Russian intelligen­ce-associated hackers in 2014.

According to the commission, any problems with the voting machines would be identified by required preelectio­n testing.

But Dmitry Volkov, chief technology officer for the company Group-IB based in Moscow, said such malicious software can be designed to be delivered “after all tests are conducted.”

“(If) a vendor has access (to an election system) through a secure channel, if you hack the vendor, you can gain an access through this secure channel,” said Volkov, a member of the advisory council on cybersecur­ity for Interpol, the European Union’s law enforcemen­t agency.

Harri Hursti, an internatio­nal expert on election cybersecur­ity and co-founder of the Voting Machine Hacking Village at the annual DEFCON hacker conference, agreed. He said that “it is hard to make the claim that anything using any kind of USB devices can be air-gapped,” or physically isolated from attack.

“USB memory cards are mini-computers,” Hursti said, “and we have known for years how to reprogram those to carry malicious content over air gaps and extract confidenti­al informatio­n.”

Modems vulnerable?

Experts said another potential vulnerabil­ity is associated with the use of modems in voting machines across Wisconsin to transmit unofficial Election Day results.

In some cases, those modems are transmitti­ng results over the Internet, Haas, the former Elections Commission administra­tor, acknowledg­ed in 2016 testimony during the legal battle over Wisconsin’s presidenti­al recount.

But Magney said the devices “do not accept any incoming connection­s. The user keys in a specific phone number to dial out. While misdials or intercepti­ons may be possible … the receiving computer also has a firewall, and accepts authentica­ted transmissi­ons for a very short period of time.”

Vendors and elections commission officials say proper safeguards, such as malware detection and encryption, are in place. Magney said the transmissi­ons are made “only after all the votes have been tabulated.” He noted that the new National Academy of Sciences report does not mention modems as a potential vulnerabil­ity.

However, computer scientists say that existing defense measures can be overrun. According to The New Yorker, such concerns have prompted four states — New York, Maryland, Virginia and Alabama — to prohibit the use of machines with modems to transmit election results.

Cellular connection adds vulnerabil­ity

Another practice criticized by the computer scientists is the use of cellular technology to transmit unofficial election results. Cellular networks’ security liabilitie­s were detailed in a 2017 U.S. Department of Homeland Security report, which called for enhanced protection­s when government­s use cellular technology.

At the center’s request, the list of cellular modems in use in Wisconsin election systems was reviewed by Bart Stidham, chief executive officer of NAND Technologi­es, who has conducted cellular network security analysis for DHS and commercial clients.

In 2017, DHS designated election systems as critical infrastruc­ture in need of enhanced protection. Stidham said most of the cellular modems used by Wisconsin “are commodity consumer devices. They are not designed for use in critical infrastruc­ture.”

Magney said the federal government “is still parsing out what that (critical infrastruc­ture) designatio­n means” when it comes to elections and voting equipment.

Another vulnerabil­ity, according to Volkov, is that some of these cellular wireless modems rely on public cellular networks. “If you are on a public network,” he said, “you can be reached.”

In February, two Princeton University computer science professors, Andrew Appel and Kyle Jamieson, published a blog describing possible scenarios to hack modems used in DS200 paper ballot tabulators, including erecting fake cellphone towers near voting locations like police do with Stingray devices.

“If your state laws, or a court with jurisdicti­on, say not to connect your voting machines to the Internet, then you probably shouldn’t use telephone modems either,” they said.

Magney downplayed the concerns, noting that only unofficial encrypted results from Election Day are transmitte­d this way after polls close. Those are backed up by a printed paper tape, which is used to verify the official results.

But even discrepanc­ies between initially reported unofficial results and the outcome of the election may achieve Russia’s goal of sowing discord, according to FireEye’s McNamara.

He is among those cautioning against becoming too focused on the vulnerabil­ities of America’s vote-tallying systems. McNamara said the Kremlin’s goal may be simpler: “Attacking the confidence of electoral process itself.”

Grigor Atanesian, a native of St. Petersburg, Russia, is an Edmund S. Muskie fellow at the Wisconsin Center for Investigat­ive Journalism. He studies investigat­ive reporting at the University of Missouri School of Journalism via a Fulbright grant.

 ?? Wisconsin Center for Investigat­ive Journalism GETTY IMAGES/ USA TODAY NETWORK PHOTO ILLUSTRATI­ON ??
Wisconsin Center for Investigat­ive Journalism GETTY IMAGES/ USA TODAY NETWORK PHOTO ILLUSTRATI­ON
 ?? DUKEHART / WISCONSIN CENTER FOR INVESTIGAT­IVE JOURNALISM COBURN ?? Dane County Clerk Scott McDonell says his county programs all of its voting machines but that many smaller counties use private vendors. “If I were being paranoid,” McDonell says, “I would worry about the outsourced ones.” He was photograph­ed in his office in the City-County Building in Madison in July.
DUKEHART / WISCONSIN CENTER FOR INVESTIGAT­IVE JOURNALISM COBURN Dane County Clerk Scott McDonell says his county programs all of its voting machines but that many smaller counties use private vendors. “If I were being paranoid,” McDonell says, “I would worry about the outsourced ones.” He was photograph­ed in his office in the City-County Building in Madison in July.

Newspapers in English

Newspapers from United States