Federal Program Offers New Cybersecurity Tool for Elections

August 6, 2020by Christina A. Cassidy, Associated Press
Voters walk to a polling station to cast votes for GOP and Democratic primary candidates Tuesday, Aug. 4, 2020, in Chandler, Ariz. (AP Photo/Ross D. Franklin)

ATLANTA (AP) — State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote, as intelligence officials continue to warn about foreign efforts to interfere in the U.S. election.

Under a $2.2 million pilot program that began in March, the Department of Homeland Security’s cybersecurity agency in partnership with the Center for Internet Security has been deploying software to election offices. It is then placed on devices, including laptops and servers used for voter registration and reporting vote totals, to detect malicious activity. The program was highlighted during a congressional hearing Tuesday.

“This is the next step, the evolution of helping state and local entities,” said Matt Masterson, a top cybersecurity official within the Department of Homeland Security. “This really advances their ability to protect their networks.”

Thirty state election offices have already integrated the so-called endpoint detection and response tools, which are routinely used in the private sector but less common at the local level. Through the federal program, officials expect to have this deployed in at least nine additional states by November. Fewer than 100 local government agencies have signed up so far.

Endpoint detection is a key component of network defense designed to detect intrusions early. The software identifies known threats as well as suspicious behavior that could indicate an attack.

“The threat actors are creating over a million new strings of malware a day,” said Michael Atkinson with FireEye, a leading cybersecurity firm that provides such software. “If you don’t have the capacity to search in your endpoint infrastructure for the bad guys and have human cybersecurity experts work on that for you, in the end, compromise will likely be inevitable.”

Under the program, CIS analysts would receive alerts of suspicious activity, allowing them to monitor and track suspicious activity across jurisdictions with the goal of early detection and mitigation. Officials said the effort was just the latest in steps taken to shore up cybersecurity since the 2016 presidential election.

“While there are no guarantees in cybersecurity, I can assure you that the security defenses we have in place for November 2020 are vastly improved over those in place a short four years ago,” John M. Gilligan, president and CEO of the Center for Internet Security, told the House Homeland Security Committee.

States were left scrambling after it was revealed Russian agents had targeted election systems leading up to the 2016 presidential election. While no evidence surfaced that any votes were altered or voter data manipulated, the actions by a foreign adversary to scrutinize the nation’s myriad election systems for vulnerabilities prompted changes including enhanced security protocols, more rigorous and regular security reviews and improved information-sharing across federal, state and local governments.

But cybersecurity experts say the threat has hardly been dulled.

Just a few weeks ago, Bill Evanina, director of the National Counterintelligence and Security Center, released a statement noting foreign adversaries are seeking to compromise election infrastructure along with campaigns, candidates and other political targets. He said the government continues to “monitor malicious cyber actors trying to gain access to U.S. state and federal networks, including those responsible for managing elections.”

The pilot program is different from a group of 269 monitoring devices, known as Albert sensors, that were deployed earlier by the Cybersecurity Infrastructure Security Agency and the Center for Internet Security that monitors traffic touching election networks. Experts have said those devices have limited value in detecting nation-state hackers.

During the congressional hearing, experts noted that local election officials are being stretched to the limit due to the pandemic, dealing with a surge in absentee ballots and a diminishing force of poll workers, with many unwilling to staff crowded polling places out of fear of getting sick.

David Levine with the Alliance for Securing Democracy told committee members that many local election offices lack the resources to boost cybersecurity defenses.

“The coronavirus has exacerbated the problem by forcing a number of states to divert election security funding to cover other unanticipated costs stemming from the pandemic,” Levine said.

An effort by Democrats to send $3.6 billion to states to help cover pandemic-related costs for elections has stalled, and Republicans’ latest proposal for coronavirus relief did not include funds for elections.

___

Associated Press writer Frank Bajak in Boston contributed to this report.

Cybersecurity

Russian Hack of US Agencies Exposed Supply Chain Weaknesses
Cybersecurity
Russian Hack of US Agencies Exposed Supply Chain Weaknesses

WASHINGTON (AP) — The elite Russian hackers who gained access to computer systems of federal agencies last year didn't bother trying to break one by one into the networks of each department. Instead, they got inside by sneaking malicious code into a software update pushed out to thousands... Read More

US: Hack of Federal Agencies Likely Russian in Origin'
Cybersecurity
US: Hack of Federal Agencies Likely Russian in Origin'

WASHINGTON (AP) — Top national security agencies confirmed Tuesday that Russia was likely responsible for a massive hack of U.S. government departments and corporations, rejecting President Donald Trump's claim that China might be to blame. The rare joint statement represented the U.S. government's first formal attempt... Read More

Biden's Team Vows Action Against Hack as US Threats Persist
Cybercrime
Biden's Team Vows Action Against Hack as US Threats Persist

WASHINGTON (AP) — Once in office, President-elect Joe Biden will punish Russia for its suspected cyberespionage operation against the United States with financial sanctions and measures to hobble the Kremlin's ability to launch future hacks, his chief of staff said Sunday, as a GOP senator criticized President Donald... Read More

Murphy Urges Leadership to Request House-wide Briefing on Suspected Russian Hack
Cybersecurity
Murphy Urges Leadership to Request House-wide Briefing on Suspected Russian Hack
December 18, 2020
by Dan McCue

WASHINGTON - Rep. Stephanie Murphy, D-Fla., is urging House leadership to schedule a classified, bipartisan briefing for members of Congress regarding the recently revealed cyberattack on the networks of the federal government and major American companies. The attack is widely believed to have been the work... Read More

US Cybersecurity Agency Warns of 'Grave' Threat from Hack
Cybercrime
US Cybersecurity Agency Warns of 'Grave' Threat from Hack

WASHINGTON -- The federal government's top cybersecurity agency on Thursday issued its most urgent warning yet about a sophisticated and extensive computer breach, saying it posed a "grave risk" to cyber networks maintained by governments, utilities and the private sector and could be difficult to purge.... Read More

Fired Cybersecurity Official Rebuts GOP Claims of Election Fraud at Senate Hearing
Cybersecurity
Fired Cybersecurity Official Rebuts GOP Claims of Election Fraud at Senate Hearing

WASHINGTON — The U.S. cybersecurity chief fired by President Donald Trump last month after he pushed back on allegations of election fraud testified before Congress on Wednesday that such baseless conspiracy theories are having a “corrosive” effect on the public’s faith in the nation’s voting system.... Read More

News From The Well
scroll top