Election Security

Cyber chief pushes audits as key to election security

voting machines (Iconic Bestiary/Shutterstock.com) 

The nation's top cybersecurity official told Congress that the ability to audit voting machines after elections is critical for ballot security.

"The area that I think we need to invest the most in the nation is ensuring auditability across infrastructure," Christopher Krebs, head of the Cybersecurity and Infrastructure Security Agency said at a Feb. 13 hearing of the House Homeland Security Committee. "If you don't know what's happening and you can't check back at what's happening in the system -- you don't have security."

While 34 states and the District of Columbia have some laws mandating post-election audits, according to the National Conference of State Legislatures, Congress has been unable to agree on how hard or soft to make such language in legislation.

Krebs and Election Assistance Commission (EAC) Chair Thomas Hicks endorsed the need for greater auditability, though both deferred to states on the question of whether it should be done digitally or by hand.

In particular, states and Republicans have pushed back on bills, including the H.R. 1 legislation currently before the House, that seek to tie eligibility for federal election security grant funding to mandates for paper ballots and risk-limiting or hand-counted post-election audits, which require some form of paper trail.

While most Democrats support mandates around paper ballots and hand-counted or risk-limiting audits, there are indications that if resistance from congressional Republicans and states continue, those demands could soften if it means sending more dollars to states and localities for election infrastructure upgrades.

Most election security experts endorse the two measures because they say that if a machine is hacked and vote totals are altered, the hacker would also be able to change the electronic image of the results that are used as a baseline for auditors to compare vote counts.

Krebs testified that over the past two years, CISA has conducted individual vulnerability assessments and penetration tests for the election infrastructure of at least 26 states and localities and found significant overlap for some of the most easily recognizable vulnerabilities.

"The interesting thing that we found was that of all those assessments, the findings were generally similar: unpatched systems, misconfigured systems, lack of multi-factor authentication," said Krebs.

Those findings were used to create guidance for states to use in spending $380 million in leftover Help America Vote Act funding allocated in 2018. Cooperation between the federal government and states is "light years" ahead of where it was in 2016, Krebs said, but "there's certainly more to do."

"The federal government -- especially Congress -- must understand the resource constraints of local election officials and partner with them to address vulnerabilities to election infrastructure though grants and services," committee Chairman Rep. Bennie Thompson (D-Miss.) said in his opening statement.

Hicks said early results from analyzing federal financial reports of the $380 million sent to states last year show that 58 percent was spent on "shoring up cybersecurity" while 33 percent went to replacing machines. Hicks emphasized those numbers are not final and could change as the commission analyzes more data.

New voluntary guidelines for purchasing voting machines are expected to be approved by EAC later this year, but they must go through public comment first. Several lawmakers expressed concern that such guidance will not be available to states in time to affect purchasing decisions for the 2020 elections.

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at djohnson@fcw.com, or follow him on Twitter @derekdoestech.

Click here for previous articles by Johnson.


Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.