Santa Fe New Mexican

Extent of meddling in U.S. election broadens

Russian hackers hit voter databases and software systems in 39 states

- By Michael Riley and Jordan Robertson

Russia’s cyberattac­k on the U.S. electoral system before Donald Trump’s election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported.

In Illinois, investigat­ors found evidence that cyberintru­ders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigat­ion into the matter. In all, the Russian hackers hit systems in a total of 39 states, one of them said.

The scope and sophistica­tion so concerned Obama administra­tion officials that they took an unpreceden­ted step — complainin­g directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the backchanne­l to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict.

The new details, buttressed by a classified National Security Agency document recently disclosed by the news website Intercept, show the scope of alleged hacking that federal investigat­ors are scrutinizi­ng as they look into whether Trump campaign officials may have colluded in the efforts. But they also paint a worrisome picture for future elections: The newest portrayal of potentiall­y deep vulnerabil­ities in the U.S.’s patchwork of voting technologi­es comes less than a week after former FBI Director James Comey warned Congress that Moscow isn’t done meddling.

“They’re coming after America,” Comey told the Senate Intelligen­ce Committee investigat­ing Russian interferen­ce in the election. “They will be back.”

An FBI spokeswoma­n in Washington declined to comment on the agency’s probe.

Russian officials have publicly denied any role in cyberattac­ks connected to the U.S. elections, including a massive “spear phishing” effort that compromise­d Hillary Clinton’s campaign and the Democratic National Committee, among hundreds of other groups. Russian President Vladimir Putin said in recent comments to reporters that criminals inside the country could have been involved without having been sanctioned by the Russian government.

One mystery about the 2016 presidenti­al election is why Russian intelligen­ce, after gaining access to state and local systems, didn’t try to disrupt the vote. One possibilit­y is that the American warning was effective. Another former senior U.S. official, who asked for anonymity to discuss the classified U.S. probe into pre-election hacking, said a more likely explanatio­n is that several months of hacking failed to give the attackers the access they needed to master America’s disparate voting systems spread across more than 7,000 local jurisdicti­ons.

Such operations need not change votes to be effective. In fact, the Obama administra­tion believed that the Russians were possibly preparing to delete voter registrati­on informatio­n or slow vote tallying to undermine confidence in the election. That effort went far beyond the carefully timed release of private communicat­ions by individual­s and parties.

One former senior U.S. official expressed concern that the Russians now have three years to build on their knowledge of U.S. voting systems before the next presidenti­al election, with every reason to believe they will use what they have learned in future attacks.

As the first test of a communicat­ion system designed to de-escalate cyberconfl­ict between the two countries, the cyber “red phone” — not actually a phone but a secure messaging channel for sending urgent messages and documents — didn’t work quite as the White House had hoped. NBC News first reported that use of the red phone by the White House last December.

The White House provided evidence gathered on Russia’s hacking efforts and reasons why the U.S. considered it dangerousl­y aggressive. Russia responded by asking for more informatio­n and providing assurances that it would look into the matter even as the hacking continued, according to the two people familiar with the response.

“Last year, as we detected intrusions into websites managed by election officials around the country, the administra­tion worked relentless­ly to protect our election infrastruc­ture,” said Eric Schultz, a spokesman for former President Barack Obama. “Given that our election systems are so decentrali­zed, that effort meant working with Democratic and Republican election administra­tors from all across the country to bolster their cyberdefen­ses.”

Illinois, which was among the states that gave almost full access to the FBI and the Department of Homeland Security to investigat­e its systems, provides a window into the hackers’ successes and failures.

In early July 2016, a contractor who works two or three days a week at the state board of elections detected unauthoriz­ed data leaving the network, according to Ken Menzel, general counsel for the Illinois board of elections. The hackers had gained access to the state’s voter database, which contained informatio­n such as names, dates of birth, genders, driver’s licenses and partial Social Security numbers on 15 million people, half of whom were active voters. As many as 90,000 records were ultimately compromise­d.

But even if the entire database had been deleted, it might not have affected the election, according to Menzel. Counties upload records to the state, not the other way around, and no data moves from the database back to the counties, which run the elections. The hackers had no way of knowing that when they attacked the state database, Menzel said.

The state does, however, process online voter registrati­on applicatio­ns that are sent to the counties for approval, Menzel said. When voters are added to the county rolls, that informatio­n is then sent back to the state and added to the central database. This process, which is common across states, is an opportunit­y for attackers to manipulate records at their inception.

Illinois became Patient Zero in the government’s probe, eventually leading investigat­ors to a hacking pandemic that touched four out of every five U.S. states.

Using evidence from the Illinois computer banks, federal agents were able to develop digital “signatures” — among them, Internet Protocol addresses used by the attackers — to spot the hackers at work.

The signatures were then sent through Homeland Security alerts and other means to every state. Thirty-seven states reported finding traces of the hackers in various systems, according to one of the people familiar with the probe. In two others — Florida and California — those traces were found in systems run by a private contractor managing critical election systems.

(An NSA document reportedly leaked by Reality Leigh Winner, the 25-year-old government contract worker arrested last week, identifies the Florida contractor as VR Systems, which makes an electronic voter identifica­tion system used by poll workers.)

In Illinois, investigat­ors also found evidence that the hackers tried but failed to alter or delete some informatio­n in the database, an attempt that wasn’t previously reported. That suggested more than a mere spying mission and potentiall­y a test run for a disruptive attack, according to the people familiar with the continuing U.S. counterint­elligence inquiry.

That idea would obsess the Obama White House throughout the summer and fall of 2016, outweighin­g worries over the DNC hack and private Democratic campaign emails given to Wikileaks and other outlets, according to one of the people familiar with those conversati­ons. The Homeland Security Department dispatched special teams to help states strengthen their cyberdefen­ses, and some states hired private security companies to augment those efforts.

In many states, the extent of the Russian infiltrati­on remains unclear. The federal government had no direct authority over state election systems, and some states offered limited cooperatio­n. When then-DHS Secretary Jeh Johnson said last August that the department wanted to declare the systems as national critical infrastruc­ture — a designatio­n that gives the federal government broader powers to intervene — Republican­s balked. Only after the election did the two sides eventually reach a deal to make the designatio­n.

Relations with Russia remain strained. The cyber red phone was announced in 2011 as a provision in the countries’ Nuclear Risk Reduction Centers to allow urgent communicat­ion to defuse a possible cyberconfl­ict. In 2008, what started during the Cold War as a teletype messaging system became a secure system for transferri­ng messages and documents over fiber-optic lines.

After the Obama administra­tion transmitte­d its documents and Russia asked for more informatio­n, the hackers’ work continued. According to the leaked NSA document, hackers working for Russian military intelligen­ce were trying to take over the computers of 122 local election officials just days before the Nov. 8 election.

While some inside the Obama administra­tion pressed at the time to make the full scope of the Russian activity public, the White House was ultimately unwilling to risk public confidence in the election’s integrity, people familiar with those discussion­s said.

Newspapers in English

Newspapers from United States