Federal Program Offers New Cybersecurity Tool for Elections

August 6, 2020by Christina A. Cassidy, Associated Press
Voters walk to a polling station to cast votes for GOP and Democratic primary candidates Tuesday, Aug. 4, 2020, in Chandler, Ariz. (AP Photo/Ross D. Franklin)

ATLANTA (AP) — State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote, as intelligence officials continue to warn about foreign efforts to interfere in the U.S. election.

Under a $2.2 million pilot program that began in March, the Department of Homeland Security’s cybersecurity agency in partnership with the Center for Internet Security has been deploying software to election offices. It is then placed on devices, including laptops and servers used for voter registration and reporting vote totals, to detect malicious activity. The program was highlighted during a congressional hearing Tuesday.

“This is the next step, the evolution of helping state and local entities,” said Matt Masterson, a top cybersecurity official within the Department of Homeland Security. “This really advances their ability to protect their networks.”

Thirty state election offices have already integrated the so-called endpoint detection and response tools, which are routinely used in the private sector but less common at the local level. Through the federal program, officials expect to have this deployed in at least nine additional states by November. Fewer than 100 local government agencies have signed up so far.

Endpoint detection is a key component of network defense designed to detect intrusions early. The software identifies known threats as well as suspicious behavior that could indicate an attack.

“The threat actors are creating over a million new strings of malware a day,” said Michael Atkinson with FireEye, a leading cybersecurity firm that provides such software. “If you don’t have the capacity to search in your endpoint infrastructure for the bad guys and have human cybersecurity experts work on that for you, in the end, compromise will likely be inevitable.”

Under the program, CIS analysts would receive alerts of suspicious activity, allowing them to monitor and track suspicious activity across jurisdictions with the goal of early detection and mitigation. Officials said the effort was just the latest in steps taken to shore up cybersecurity since the 2016 presidential election.

“While there are no guarantees in cybersecurity, I can assure you that the security defenses we have in place for November 2020 are vastly improved over those in place a short four years ago,” John M. Gilligan, president and CEO of the Center for Internet Security, told the House Homeland Security Committee.

States were left scrambling after it was revealed Russian agents had targeted election systems leading up to the 2016 presidential election. While no evidence surfaced that any votes were altered or voter data manipulated, the actions by a foreign adversary to scrutinize the nation’s myriad election systems for vulnerabilities prompted changes including enhanced security protocols, more rigorous and regular security reviews and improved information-sharing across federal, state and local governments.

But cybersecurity experts say the threat has hardly been dulled.

Just a few weeks ago, Bill Evanina, director of the National Counterintelligence and Security Center, released a statement noting foreign adversaries are seeking to compromise election infrastructure along with campaigns, candidates and other political targets. He said the government continues to “monitor malicious cyber actors trying to gain access to U.S. state and federal networks, including those responsible for managing elections.”

The pilot program is different from a group of 269 monitoring devices, known as Albert sensors, that were deployed earlier by the Cybersecurity Infrastructure Security Agency and the Center for Internet Security that monitors traffic touching election networks. Experts have said those devices have limited value in detecting nation-state hackers.

During the congressional hearing, experts noted that local election officials are being stretched to the limit due to the pandemic, dealing with a surge in absentee ballots and a diminishing force of poll workers, with many unwilling to staff crowded polling places out of fear of getting sick.

David Levine with the Alliance for Securing Democracy told committee members that many local election offices lack the resources to boost cybersecurity defenses.

“The coronavirus has exacerbated the problem by forcing a number of states to divert election security funding to cover other unanticipated costs stemming from the pandemic,” Levine said.

An effort by Democrats to send $3.6 billion to states to help cover pandemic-related costs for elections has stalled, and Republicans’ latest proposal for coronavirus relief did not include funds for elections.

___

Associated Press writer Frank Bajak in Boston contributed to this report.

Cybersecurity

Cybercriminals Strike Schools Amid Pandemic
Cybercrime
Cybercriminals Strike Schools Amid Pandemic

WASHINGTON — Just days before the Aug. 3 scheduled start of school, officials at the Athens Independent School District in East Texas received a shock. Cybercriminals had attacked the district’s entire computer network, encrypting all the data and demanding $50,000 in ransom for its release. Access... Read More

FBI Director Warns Congress of Evolving Terrorism Threats
Cybersecurity
FBI Director Warns Congress of Evolving Terrorism Threats
September 17, 2020
by Tom Ramstack

WASHINGTON -- The FBI’s director acknowledged Thursday that the risks of terrorism and other attacks against the United States are evolving so fast that his agency has difficulty managing them. Cyberattackers threaten the next presidential election, COVID-19 vaccine development and U.S. industries’ best research into new... Read More

Microsoft Detects Foreign Cyberattacks Targeting US Presidential Election
2020 Elections
Microsoft Detects Foreign Cyberattacks Targeting US Presidential Election

Groups from Russia, China and Iran have stepped up cyberattacks in an effort to disrupt the U.S. presidential election in November, a Microsoft Corp. investigation found. The groups have increased cyberattacks targeting the political campaigns of Democratic presidential nominee Joe Biden and U.S. President Donald Trump,... Read More

Harvard's Belfer Center Releases Playbook to Address Nefarious Election Influence
Elections
Harvard's Belfer Center Releases Playbook to Address Nefarious Election Influence
September 4, 2020
by Dan McCue

CAMBRIDGE, Mass. - Election officials across the country have a new tool to help them recognize and respond to malicious interference in the votes they oversee. Created by the Belfer Center at Harvard University's Kennedy School of Government, the new "Election Influence Operations Playbook" focuses on... Read More

Counterterrorism Still a Concern in the COVID-19 Era
Cybersecurity
Counterterrorism Still a Concern in the COVID-19 Era
September 4, 2020
by Kate Michael

WASHINGTON — Terrorism hasn’t disappeared just because a pandemic is happening. In fact, calamitous world conditions embolden those who want to do others harm, and police budget cuts, virus-related conspiracy theories, and other vulnerabilities are exacerbated during the COVID-19 crisis. To better understand the impact of... Read More

US Sees Little Evidence of Foreign Meddling in Mail-In Voting
2020 Elections
US Sees Little Evidence of Foreign Meddling in Mail-In Voting

WASHINGTON — U.S. officials said they see little evidence of coordinated voter fraud or efforts by foreign adversaries to manipulate mail-in balloting ahead of the November election even as President Donald Trump repeatedly warns that the vote is at risk. In a briefing Wednesday, intelligence officials... Read More

News From The Well
scroll top