As Americans Vote, Will Hackers Pounce?

Région :
Analyses:

Panelists at Kennedy School discuss DNC attacks and wider vulnerabilities

In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.

The DNC’s system “lit up like a Christmas tree,” said Dmitri Alperovitch, CrowdStrike’s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. “Cozy Bear,” Russia’s Federal Security Service, had been attacking the DNC since the summer of 2015. “Fancy Bear,” which refers to Russia’s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.

As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin’s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.

“The fundamental objective here by the Russians is not necessarily to get one person or another elected as president,” said Alperovitch. “The fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election — the cornerstone of our democracy.”

The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.

Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters’ intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.

Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger

Moderator and director of the Belfer Center’s Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. “The fundamental objective [of the hack] … is to undermine the very idea of a free and fair election,” said Alperovitch. Photo by Sarah Silbiger

However, five states — Delaware, Georgia, Louisiana, New Jersey, and South Carolina — have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.

Voting isn’t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states — Arizona and Illinois — have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?

“The breaches … in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,” said Smith. “This is happening. We need to check our systems.”

The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.

No less urgent, said the Belfer Center’s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.

“The United States needs to come out after this election and establish some kind of deterrent policy,” said Buchanan, a postdoctoral fellow with the center’s Cyber Security Project. “If you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.”



Articles Par : Laura Colarusso

Avis de non-responsabilité : Les opinions exprimées dans cet article n'engagent que le ou les auteurs. Le Centre de recherche sur la mondialisation se dégage de toute responsabilité concernant le contenu de cet article et ne sera pas tenu responsable pour des erreurs ou informations incorrectes ou inexactes.

Le Centre de recherche sur la mondialisation (CRM) accorde la permission de reproduire la version intégrale ou des extraits d'articles du site Mondialisation.ca sur des sites de médias alternatifs. La source de l'article, l'adresse url ainsi qu'un hyperlien vers l'article original du CRM doivent être indiqués. Une note de droit d'auteur (copyright) doit également être indiquée.

Pour publier des articles de Mondialisation.ca en format papier ou autre, y compris les sites Internet commerciaux, contactez: [email protected]

Mondialisation.ca contient du matériel protégé par le droit d'auteur, dont le détenteur n'a pas toujours autorisé l’utilisation. Nous mettons ce matériel à la disposition de nos lecteurs en vertu du principe "d'utilisation équitable", dans le but d'améliorer la compréhension des enjeux politiques, économiques et sociaux. Tout le matériel mis en ligne sur ce site est à but non lucratif. Il est mis à la disposition de tous ceux qui s'y intéressent dans le but de faire de la recherche ainsi qu'à des fins éducatives. Si vous désirez utiliser du matériel protégé par le droit d'auteur pour des raisons autres que "l'utilisation équitable", vous devez demander la permission au détenteur du droit d'auteur.

Contact média: [email protected]