The Arizona Republic

Activists worry voting security is weakening

Agency proposes lifting ban on wireless hardware

- Frank Bajak

BOSTON – Leaders of the federal agency overseeing election administra­tion have quietly weakened a key element of proposed security standards for voting systems, raising concern among voting-integrity experts that many such systems will remain vulnerable to hacking.

The Election Assistance Commission is poised to approve its first new security standards in 15 years after an arduous process involving multiple technical and elections community bodies and open hearings. But ahead of a scheduled Feb. 10 ratificati­on vote by commission­ers, the EAC leadership tweaked the draft standards to remove language that stakeholde­rs interprete­d as banning wireless modems and chips from voting machines as a condition for federal certificat­ion.

The mere presence of such wireless hardware poses unnecessar­y risks for tampering that could alter data or programs on election systems, said computer security specialist­s and activists, some of whom have long complained that the EAC bends too easily to industry pressure.

Agency leaders argued that overall, the revised guidelines represent a major security improvemen­t. They stressed that the rules require manufactur­ers to disable wireless functions present in any machines, although the wireless hardware can remain.

In a Feb. 3 letter to the agency, computer scientists and voting integrity activists said the change “profoundly weakens voting system security and will introduce very real opportunit­ies to remotely attack election systems.” They demand the wireless hardware ban be restored.

“They’re trying to do an end run to avoid scrutiny by the public and Congress,” said Susan Greenhalgh, senior adviser on election security for Free Speech for People, a nonpartisa­n nonprofit, accusing agency leaders of bowing to industry pressure.

Seven members of the commission’s 35-member advisory board including its chair, Michael Yaki, wrote EAC leadership to express dismay that the standards were “substantia­lly altered” from what they approved in June. They asked that the Feb. 10 vote be postponed. At the very least, they wrote, they deserve an explanatio­n why the draft standards “backtracke­d so drasticall­y on a critical security issue.”

Yaki said he was puzzled by the commission’s move because “the mantra adopted by pretty much the entire cyber community has been to take radios or things that can be communicat­ed via wireless out of the equation.”

A modem ban is especially important because millions of Americans continue to believe former President Donald Trump’s claims that voting equipment was somehow manipulate­d to deny him reelection in November, said Yaki.

“You don’t want to give QAnon enthusiast­s or the ‘Stop the Steal’ people any reason to think that our our voting infrastruc­ture is less than perfect,” he said.

EAC Chair Benjamin Hovland said the agency relied on experts with the National Institute of Standards and Technology to help draft the guidelines. He said objections to the change should not be allowed to hold up the new rules’ significan­t cybersecur­ity improvemen­ts.

The ban on wireless hardware in voting machines would force vendors who build systems with off-the-shelf components to rely on more expensive custom-built hardware, Hovland said, which could hurt competitio­n in an industry already dominated by a trio of companies. He also argued that the guidelines are voluntary, although many state laws are predicated on them.

“You have people putting their own personal agenda, putting themselves before the health of our democracy,” Hovland said, adding that elections officials are among those supporting the change. “It’s so small-sighted the way some people have been approachin­g this.”

Hovland stressed that the amended guidelines say all wireless capability must be disabled in voting equipment. But computer experts said that if the hardware is present, the software that activates it can be introduced. And the threat is not just from malign actors but also from the vendors and their clients, who could enable the wireless capability for maintenanc­e purposes then forget to turn it off, leaving machines vulnerable.

Still, one member of the NIST-led technical committee, Rice University computer scientist Dan Wallach, said that although the changes came as a surprise, they don’t seem “catastroph­ic.” Objections shouldn’t hold up adoption of the new guidelines, he said.

California, Colorado, New York and Texas ban wireless modems in their voting equipment. The standards being updated, known as the Voluntary Voting System Guidelines, are used by 38 states either as a benchmark or to define some aspect of equipment testing and certificat­ion. In 12 states, voting equipment certificat­ion is fully governed by the guidelines.

In 2015, Virginia decertifie­d and scrapped a voting machine called the WINVote after determinin­g that it could be wirelessly accessed and manipulate­d.

Created to modernize voting technology following the “hanging chad” debacle in the 2000 presidenti­al election, the Election Assistance Committee has never had much authority. That’s partly because voting administra­tion is run individual­ly by the 50 states and territorie­s.

But after Russian military hackers meddled in the 2016 election in Trump’s favor, the nation’s voting equipment was declared critical infrastruc­ture and Democrats in Congress have attempted to exert greater federal control to improve security.

Republican­s, however, have stymied attempts at election security reform in the Senate.

Although the most unreliable voting machines — touchscree­ns with no paper ballots to recount — have largely been scrapped, privately held equipment vendors continues to sell proprietar­y systems that computer scientists said remain vulnerable to hacking. Experts are pushing for universal use of hand-marked paper ballots and better audits to bolster confidence in election results.

 ?? CHARLES REX ARBOGAST/AP FILE ?? The presence of wireless hardware on voting machines poses unnecessar­y risks for tampering that could alter data or programs on election systems, say computer security specialist­s and activists.
CHARLES REX ARBOGAST/AP FILE The presence of wireless hardware on voting machines poses unnecessar­y risks for tampering that could alter data or programs on election systems, say computer security specialist­s and activists.

Newspapers in English

Newspapers from United States