The Atlanta Journal-Constitution

‘You could not access confidenti­al voter data’

-

sion,” despite the GBI’s findings that scans came from the DHS.

“The attorney general determined that the secretary of state’s office properly referred this matter to law enforcemen­t for investigat­ion,” Broce said. “The systems put in place by Brian Kemp as Georgia’s secretary of state kept voter data safe and secure.”

In 2018, while the secretary of state’s office rushed to fix the vulnerabil­ity before Election Day, Broce, who was also Kemp’s spokeswoma­n then, said the last-minute patches to the website were “standard practice.”

The attorney general’s office in March closed the investigat­ion Kemp started, finding no evidence that would justify a prosecutio­n.

After the investigat­ion ended, The Atlanta Journal-Constituti­on used the Georgia Open Records Act to obtain 395 pages of GBI case files, including interview summaries, emails and election security reports.

“Accusing an opponent of criminal acts without basis in fact, and lying to the public to cover up their own ineptitude, was a breach of public trust,” Sara Tindall Ghazal, the Democratic Party of Georgia’s voter protection director at the time, said in an interview. Ghazal helped alert authoritie­s to the election website vulnerabil­ities.

The GBI files don’t explain the basis for the decision by Kemp’s office to blame the Democratic Party or support his accusation. Kemp went on to narrowly defeat Democrat Stacey Abrams in the election for governor.

Raising the alarm

Events unfolded quickly when Richard Wright, a Roswell voter, noticed vulnerabil­ities in the state’s election website shortly before voters went to the polls Nov. 6, 2018, according to the case files.

Wright, a Georgia Tech graduate and Democratic voter who works for a software company, had listened to a news report about a lawsuit over election security. He then checked his voter registrati­on informatio­n and used his web browser’s built-in tools to analyze the state’s My Voter Page.

“When visiting the MVP site, I was curious if there were security issues given the recent news coverage I had heard,” Wright wrote in a response to questions from the attorney general’s office.

Wright found that he could look up other voters’ informatio­n by modifying the web address on the site, a flaw confirmed by ProPublica and Georgia Public Broadcasti­ng before it was fixed.

He also made more disconcert­ing claims, that someone could “download any file on the system” as well as voters’ driver’s license numbers and partial Social Security numbers. Those allegation­s were not substantia­ted. Wright told investigat­ors he didn’t attempt to look at any informatio­n on the website other than his own and his wife’s.

Kemp’s office disputes Wright’s allegation­s.

“Richard Wright’s allegation­s — sent through the Abrams campaign and funneled to the Democratic Party of Georgia — were false because you could not access confidenti­al voter data,” Broce said.

After discoverin­g the vulnerabil­ity, Wright contacted plaintiffs in the election security lawsuit and the Democratic Party of Georgia. They passed along his concerns, which soon reached the FBI, the National Security Agency, the GBI, the Abrams campaign, Georgia Tech professors and attorneys for the secretary of state’s office.

Kemp’s staff began looking into Wright’s claims. If true, they would be another blemish on Kemp’s election security record after his office had previously exposed voter data and the state’s Center for Election Systems at Kennesaw State University wiped election servers soon after being sued. His staffers, however, suspected hacking.

“Our vendor’s research shows that the only way to accomplish this on the site is using tools designed to attack websites, which is what we fear is happening here,” Ryan Germany, Kemp’s general counsel, wrote in a Nov. 3 email. “Our vendor is making changes tonight to resolve the issue and is reviewing logs, but after our initial research it seems that we are dealing with an intentiona­l attempt to hack a website.”

An election security vendor for the state, Fortalice Solutions, later concluded, however, that there was no evidence that voter informatio­n had been accessed, manipulate­d or changed by bad actors.

Fortalice also confirmed vulnerabil­ities that exposed files on the My Voter Page. The DHS exploited those vulnerabil­ities when it was testing Georgia’s election system in October 2018, according to the GBI files. Details of Fortalice’s findings were redacted from those files. The company said the vulnerabil­ities did not reveal confidenti­al voter informatio­n.

Neverthele­ss, “having an unpatched vulnerabil­ity like this is a really big problem,” said Richard DeMillo, a Georgia Tech cybersecur­ity professor contacted by the Democratic Party with Wright’s concerns. “Since we know that the Russians were probing voter registrati­on sites, why would you assume this kind of vulnerabil­ity wasn’t something they could exploit?”

Hacking fears

Wright’s email to the Democratic Party included an attached file that showed his web browser’s interactio­ns with the My Voter Page. The way the website worked suggested to Wright that the system could be exploited.

When that email reached Kemp’s office, Broce told investigat­ors she thought the attachment was a script that could be used for hacking.

That wasn’t true, according to a GBI digital forensic investigat­or. The file was “merely a roadmap” of the website’s behavior.

But someone else was probing Georgia’s election websites: the U.S. government. The DHS’ Cybersecur­ity and Infrastruc­ture Security Agency confirmed it was conducting cyberhygie­ne scanning to find vulnerabil­ities, tests that had been approved in advance by Kemp’s office.

Broce, who was both Kemp’s press secretary and a staff attorney, told investigat­ors she was concerned that Wright had “spoofed” internet addresses to make it look like they were coming from the DHS. Investigat­ors later confirmed with Homeland Security officials and their network providers that they were the source of the scans.

It remains unclear how Kemp’s staff concluded that the Democratic Party was responsibl­e for a hacking attempt. The party’s only role was that it had forwarded an email about vulnerabil­ities to two cybersecur­ity professors at Georgia Tech, including DeMillo, who then alerted authoritie­s. The GBI did not interview Kemp about the case.

“Instead of immediatel­y addressing the problem, it became political. It became an attack on the Democratic Party on the eve of the election,” said David Cross, an attorney for plaintiffs in the election security lawsuit against the state. “I don’t see any way anyone could have a genuine belief there was any hacking done at all, much less by the Democratic Party.”

While publicly denying Wright’s claims about vulnerabil­ities, behind the scenes, Kemp’s staff was working to correct them.

ProPublica and GPB reported on the day before the election that Kemp’s office was patching problems with the state’s election website, even as Kemp maintained the system was secure. The GBI files confirmed the My Voter Page was modified to restrict access to vulnerable areas.

The secretary of state’s firewall hadn’t been set up to block access to the locations identified by Wright, according to a GBI agent’s report. Election officials then “set up safeguards to restrict access to the vulnerable areas” on the last two days before the 2018 general election.

ProPublica found at the time that the vulnerabil­ity gave access to some nonconfide­ntial informatio­n on the My Voter Page, such as a voter’s absentee ballot status. Birth dates, Social Security numbers and driver’s license numbers weren’t available. It wasn’t clear what sensitive informatio­n, however, could have been inadverten­tly accessible before programmin­g errors were fixed.

Even if the security vulnerabil­ities revealed public informatio­n, webpages would have been nonetheles­s visible to people who shouldn’t have been able to see them. The flaws also exposed details of the computer system that could have given hackers a road map to inflict greater damage.

Georgia election officials and their cybersecur­ity companies should have detected the problem before Wright brought it to their attention, said Frank Rietta, CEO of Rietta.com, a web applicatio­n security firm based in the Atlanta suburb of Alpharetta. Users of the My Voter Page were able to access voter registrati­on informatio­n without first logging in.

This type of weakness, called broken access control, is one of the 10 most critical web applicatio­n security risks, according to the Open Web Applicatio­n Security Project, an organizati­on that works to improve software security.

“The fact that there’s one vulnerabil­ity is an indication that there might have been other vulnerabil­ities,” Rietta said. “We should want to fix vulnerabil­ities, not pretend they’re not there until it is exploited by the bad guys.”

When Kemp’s office found out about the problem, Broce repeatedly dismissed it. Though some of Wright’s concerns weren’t validated, the GBI files confirmed that anyone could alter web addresses to access other voters’ informatio­n on the My Voter Page.

Then Broce said changes to the website were routine, meant to accommodat­e high traffic prior to Election Day, when in fact election officials were fixing a vulnerabil­ity Wright had brought to their attention.

“We make changes to our website all the time,” Broce told ProPublica and GPB at the time. “We always move our My Voter Page to a static page before Election Day to manage volume and capacity. It is standard practice.”

Even after the GBI cleared Wright, Broce said the investigat­ion was appropriat­e.

Wright declined to comment for this article, but he answered a list of questions for the attorney general’s office about his findings.

“I do not engage in ‘hacking’ activities. I reported the vulnerabil­ity that I discovered on the SOS My Voter Webpage because I was concerned that our elections process might not be secure,” Wright wrote.

Broce suspected a Democratic Party plot to undermine Kemp’s credibilit­y, according to an interview with the GBI.

She was also facing questions about security weaknesses from reporters for the website WhoWhatWhy, who she speculated were working with the plaintiffs in the election security lawsuit.

Broce told investigat­ors that cybersecur­ity companies had identified attempts to exploit voter registrati­on websites, but they weren’t able to verify where the scans came from.

Those companies later verified they originated with Homeland Security.

Soon after WhoWhatWhy published its article alleging that a hacker could compromise Georgia’s election, Broce posted a news release on the secretary of state’s website saying the office was opening an investigat­ion of the Democratic Party, alleging a hacking attempt.

Ghazal, with the Democratic Party, said in an interview the party reported the website vulnerabil­ities but made no effort to publicize them, contact news media or turn them into an attack.

Richard DeMillo, Georgia Tech cybersecur­ity professor contacted by the Democratic Party about a voter’s cybersecur­ity concerns

 ?? FACEBOOK ?? Gov. Brian Kemp’s spokeswoma­n, Candice Broce (second from right), shown taking an oath after he was sworn in as governor in January 2019, still insisted last month that elections officials responded to a “failed cyber intrusion,” despite GBI findings that scans came from DHS.
FACEBOOK Gov. Brian Kemp’s spokeswoma­n, Candice Broce (second from right), shown taking an oath after he was sworn in as governor in January 2019, still insisted last month that elections officials responded to a “failed cyber intrusion,” despite GBI findings that scans came from DHS.
 ??  ??

Newspapers in English

Newspapers from United States