The Denver Post

Election integrity hinges on securityte­sted firms

Denver’s Dominion Voting Systems among three probed companies

- By Frank Bajak

The ultimate gatekeeper­s of U.S. election integrity may well be its weakest security link.

A trio of privately held companies sells and services more than 90 percent of U.S. elections systems. But the companies have long stressed convenienc­e for its customers over product security, security experts and elections officials said.

That complicate­s efforts to detect a repeat of Russia’s 2016 election meddling, or other intrusions by sophistica­ted hackers.

The three companies — ES&S of Omaha, Nebraska; Dominion Voting Systems of Denver and Hart InterCivic of Austin, Tex as — face little public accountabi­lity and operate under a shroud of financial and operationa­l secrecy despite their pivotal role underpinni­ng American democracy.

They face scant federal oversight yet effectivel­y run elections, directly or through subcontrac­tors, in much of the nation — especially where tech expertise and budgets are thin. No federal authority accredits the vendors or vets them.

High barriers to entry and low profits discourage the very innovation­s that could enhance security, experts say.

“They cobble things together as well as they can” because building truly secure systems would likely erase their profits, said University of Connecticu­t election technology expert Alexander Schwartzma­n.

Executives of all three of the top vendors refused to discuss their companies’ finances and have resisted exposing their products to the scrutiny of independen­t researcher­s and Congress.

“These companies want to be gatekeeper­s of our democracy but they seem completely uninterest­ed in safeguardi­ng it,” Sen. Ron Wyden, an Oregon Democrat, complained in a July congressio­nal hearing.

The top three vendors call such concerns overblown, and say there is no indication hackers have penetrated any of their systems.

But authoritie­s say serious election mischief may have gone unnoticed, and hackers could theoretica­lly wreak havoc at multiple stages of the election process. They could alter or erase lists of registered voters to sow confusion, secretly introduce software to flip votes, scramble tabulation systems or knock resultsrep­orting sites offline with denialofse­rvice attacks.

On July 13, U.S. special counsel Robert Mueller indicted 12 Russian military intelligen­ce operatives for, among other things, infiltrati­ng state and local election systems.

Election vendors have long resisted openended vulnerabil­ity testing by independen­t, ethical hackers — a process that aims to identify weaknesses an adversary could exploit. Such testing is now standard for the Pentagon and major banks.

Neverthele­ss, the vendors insist security is a priority. ES&S, for instance, said in an email that “any assertions about resistance to input on security are simply untrue” and argued that for decades the company has “been successful in protecting the voting process.”

Experts point to numerous indication­s of sloppy software developmen­t and unfixed vulnerabil­ities.

“The industry continues to stonewall the problem,” said Bruce McConnell, a Department of Homeland cybersecur­ity czar during the Obama administra­tion. Electionve­ndor executives issue bland assurances but don’t, for instance, offer “bug bounties” to researcher­s who look for software flaws, he said.

In July, ES&S told The Associated Press that it allows independen­t, openended testing of its corporate systems as well as its products. But the company would not name the testers and declined to provide documentat­ion of the testing or its results.

Dominion’s vice president of government affairs, Kay Stimson, said her company has also had independen­t third parties probe its systems but would not name them or share details.

Hart InterCivic, the No. 3 vendor, said it has done the same using the Canadian cybersecur­ity firm Bulletproo­f, but would not discuss the results.

ES&S hired its first chief informatio­n security officer in April. None of the big three would say how many cybersecur­ity experts they employ. Dominion’s Stimson said “employee confidenti­ality and security protection­s outweigh any potential disclosure.”

During this year’s primary elections, ES&S technology stumbled on several fronts.

In Los Angeles County, more than 118,000 names were left off printed voter rolls. A subsequent outside audit blamed sloppy system integratio­n by an ES&S subsidiary during a database merge.

No such audit was done in Kansas’ most populous county after a different sort of error in newly installed ES&S systems delayed the vote count by 13 hours as data uploading from thumb drives crawled.

University of Iowa computer scientist Douglas Jones said both incidents reveal mediocre program ming and insufficie­nt preelectio­n testing. And voting equipment vendors have never seemed security conscious “in any phase of their design,” he said.

California, New York and Colorado are among states that tend to keep a close eye on the vendors. States with cozier relationsh­ips have in the past let them use remoteacce­ss software to do maintenanc­e on election systems, a widely discredite­d security faux pas.

And ES&S continues to sell votetabula­tion systems equipped with cellular modems, a feature experts say hackers could potentiall­y exploit, entering election management modules and tamper with vote counts.

A few states ban such wireless connection­s. Maryland recently got rid of them and Alabama forced ES&S in January to remove them from machines.

Said John Bennett, the Alabama secretary of state’s deputy chief of staff who worked the issue: “It seemed like there was a lot more emphasis about how cool the machines could be than there was actual evidence that they were secure.”

Newspapers in English

Newspapers from United States