Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
A monthly show featuring interviews with experts in IT and Information Security discussing the latest trends and hottest cyber topics and challenges impacting the federal community. Follow Sean on Twitter. Subscribe on Apple Podcasts or Podcast One.
How secure is the election process?
Sean Kelley
The 2016 elections left a swirl of unanswered questions around election security. In a two-part series, host Sean Kelley discusses the state of cybersecurity as it pertains to the election of our future leaders. He’s joined by:
There are approximately 9,000 election jurisdictions in the U.S., with an almost equal number of different technologies and configurations that could be employed during elections. According to the Brennan Center for Justice, 13 states have machines that produce no auditable paper trail, which is crucial in rooting out irregularities or hacks. And five states use paperless machines statewide that also don’t have an audit trail.
Close to 80 percent of the votes cast in 2016 had an auditable record associated with them. But, Masterson said, Homeland Security Secretary Kirstjen Nielsen wants 100 percent of the votes in 2020 to have an auditable record.
As agencies begin to formalize their AI programs and look at where to scale up pilots and use cases, federal and industry leaders point to prioritizing based on outcomes. Learn insights from DHS, NSF and VA, as well as Pegasystems in our new ebook.
Masterson said it can be achieved through the practice of defense in depth. “There is no silver bullet to protect systems, but [you can] create layers of security such as physical, network and application security. DHS utilizes this approach when working with state and local officials to build a resilient election process, so that when incidents occur, they are not only able to detect them, but also recover from them while maintaining the integrity of the process,” Masterson said.
“DEF CON [an international hacker convention] stood up voting villages and procured legacy voting equipment and brought in security researchers with unfettered access to understand the vulnerabilities that reside in these technologies. In many cases, this equipment had been produced in the early 2000s. While some of it is still in operation in some of our election jurisdictions today, those election jurisdictions shine when it comes to protecting this legacy equipment and ensuring that elections that are conducted on this legacy equipment can be trusted,” Wlaschin said.
The biggest misconception regarding elections and election security is the idea that election machines are reachable through the internet, which would make them hackable. “The election industry works really hard to design, test, and deliver voting machines, tabulations and election management systems that are up to EAC standards,” Wlaschin said.
Hundreds of elections occur throughout the year with safe, secure and trustworthy results. But that doesn’t mean U.S. election infrastructure is where it needs to be. “The $380 million distributed by the Election Assistance Commission should be considered a down payment on continued and regular recurring investment in our election infrastructure,” Wlaschin said.
Top Takeaways:
Copyright © 2023 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.
Related Stories
Cybersecurity in the VA’s Connected Health
VA’s former acting CIO reflects on his tenure
How to improve cybersecurity and workflow by consolidating systems