The Times Real Estate


.

  • Written by Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Hacking into voting machines remains far too easy.

It is too soon to say for sure what role cybersecurity played in the 2020 Iowa caucuses, but the problems, which are still unfolding and being investigated[1], show how easily systemic failures[2] can lead to delays and undermine trust in democratic processes. That’s particularly true when new technology – in this case, a reporting app[3] – is introduced, even if there’s no targeted attack on the system.

The vulnerabilities are not just theoretical. They have been exploited around the world, such as in South Africa[4], Ukraine, Bulgaria and the Philippines[5]. Successful attacks don’t need the resources and expertise of national governments – even kids[6] have managed it.

Congress and election officials around the U.S. are struggling[7] to figure out what to do to protect the integrity of Americans’ votes in 2020 and beyond. The Iowa caucuses are run by political parties, not state officials, but many of the concepts and processes are comparable. A look at similar problems – and some attempts at solutions – around the world offers some ideas that U.S. officials could use to ensure everyone’s vote is recorded and counted accurately, and that any necessary audits and recounts will confirm that election results are correct.

As a scholar researching cybersecurity and internet governance[8] for more than 10 years, I have come to the conclusion that only by working together[9] across sectors, industries and nations can the people of the world make their democracies harder to hack[10] and achieve some measure of what I and others call cyber peace[11].

Electronic tampering is not new

As far back as 1994, an unknown hacker tried to alter the results of an election[12] – but the effort failed, and Nelson Mandela was elected president of South Africa.

A similar effort played out in 2014 when Russian-backed hackers targeted Ukraine, attempting to fake vote totals for the presidential election. They were caught[13] just in time, but the sophistication of the attacks should have been seen as a shot across the bow for future elections[14] in the U.S. and around the world.

US could learn how to improve election protection from other nations The U.S. military’s Cyber Command is helping secure elections against foreign intruders. Steve Stover/U.S. Army[15]

How has the US government responded?

More than two-thirds of U.S. counties[16] are using voting machines that are at least a decade old. Because many of these machines are running outdated operating systems[17], they are vulnerable to exploitation.

The multi-pronged strategy used by the Kremlin to undermine the 2016 U.S. presidential election shared parallels with the election in Ukraine back in 2014, including the probing of insecure voting machines[18], compromising voter-registration lists[19] and weaponizing social media[20] to spread misinformation.

To date, the U.S. response has been weak. True, the threats are complex, and partisan rancor[21] hasn’t made it any easier for officials to unite against them. Still, local, state and federal government agencies have made some progress.

For instance, in 2018 Congress agreed to spend US$380 million to help states buy more secure voting machines[22]. In December 2019, Congress and the president agreed to spend a further $425 million[23] on election cybersecurity, which is in line with estimates[24] for how much it would cost to replace digitally vulnerable paperless voting machines across the nation.

These funds will allow more states to upgrade their voting equipment, and conduct post-election audits. But this is still less than a quarter of the amount Congress appropriated – nearly $4 billion – to upgrade U.S. voting systems after the confusion of the 2000 election[25].

U.S. Cyber Command has been sharing information with local officials, as well as becoming more active such as by shutting down a Russian troll farm[26] on Election Day 2018.

Lessons from other nations

Like the United States, the European Union has also faced hacking attacks on election systems[27], including in the Netherlands, Bulgaria and the Czech Republic.

In response, the EU has increased cybersecurity requirements[28] on election officials and infrastructure providers requiring things like more robust authentication procedures to help confirm voters’ identities. It has also urged its members to use paper ballots and analog vote-counting systems[29] to help ward off concerns over compromised voting machines.

Nations around the world – including Germany and Brazil – that have used electronic voting machines are going back to paper ballots[30] in part due to security and transparency concerns, while a 2019 court order[31] requires paper trail audits in Indian elections.

Other mature democracies, like Australia, do far more than the U.S. to protect the vote. Australians all use paper ballots, which are hand counted[32], and voting itself is mandatory so there are no issues over voting rights. The country’s powerful Electoral Commission[33] also sets nationwide standards and oversees the entire voting process[34], as opposed to the more decentralized U.S. approach.

US could learn how to improve election protection from other nations Australian election officials hand-count ballots. Australian Electoral Commission/Wikimedia Commons[35]

International initiatives

The problem is global, and in my view would benefit from an internationally coordinated solution among both advanced and emerging democracies. Many nations and interested businesses and organizations around the world say they want to join the fight. The G7 and the U.N.[36] have issued statements emphasizing the importance of protecting democracy and securing voting machines.

The Paris Call for Trust and Security in Cyberspace[37] – which specifically calls on its backers to “cooperate in order to prevent interference in electoral processes” by sharing intelligence – has more than 550 supporters, including 67 nations. The U.S. is part of the G7 and the U.N., but hasn’t joined the Paris Call. Nevertheless, U.S. election officials could learn from other countries’ experiences[38].

Time is growing short

In the U.S., states are already trying approaches that have worked in other countries, but federal rules have not yet caught up. Congress could encourage states to follow Colorado’s example by banning[39] paperless ballots, and requiring risk-limiting audits[40], which double-check statistically significant samples of paper ballots to check if official election results are correct. That would increase voter confidence that the outcomes were correct.

Congress could similarly require the National Institute for Standards and Technology to update its standards for voting machines[41], which state and county election officials rely on when deciding which machines to purchase.

The U.S. could also create a National Cybersecurity Safety Board[42] to investigate cyberattacks on U.S. election infrastructure and issue reports after elections to help ensure that experts and the public alike are aware of the vulnerabilities and work to fix them.

Democracy is a team sport. Scholars[43] can also help federal, state and local governments secure the country’s election system, by devising and testing possible improvements.

Different approaches around the country may make the overall system more secure, but the diversity of potential problems means the election officials on the ground need help. There’s still time to avoid a replay of South Africa 1994 or Ukraine 2014 in the 2020 U.S. elections.

[ You’re smart and curious about the world. So are The Conversation’s authors and editors. You can get our highlights each weekend[44]. ]

References

  1. ^ still unfolding and being investigated (www.desmoinesregister.com)
  2. ^ systemic failures (www.nytimes.com)
  3. ^ reporting app (www.businessinsider.com)
  4. ^ South Africa (successfulsocieties.princeton.edu)
  5. ^ Philippines (fortune.com)
  6. ^ kids (www.theguardian.com)
  7. ^ struggling (www.bushcenter.org)
  8. ^ scholar researching cybersecurity and internet governance (scholar.google.com)
  9. ^ only by working together (www.ushistory.org)
  10. ^ harder to hack (www.csmonitor.com)
  11. ^ cyber peace (www.bushcenter.org)
  12. ^ hacker tried to alter the results of an election (www.telegraph.co.uk)
  13. ^ were caught (www.csmonitor.com)
  14. ^ a shot across the bow for future elections (www.csmonitor.com)
  15. ^ Steve Stover/U.S. Army (www.army.mil)
  16. ^ More than two-thirds of U.S. counties (www.theverge.com)
  17. ^ outdated operating systems (www.latimes.com)
  18. ^ insecure voting machines (thehill.com)
  19. ^ compromising voter-registration lists (abc7chicago.com)
  20. ^ weaponizing social media (www.npr.org)
  21. ^ partisan rancor (www.npr.org)
  22. ^ spend US$380 million to help states buy more secure voting machines (www.npr.org)
  23. ^ further $425 million (apnews.com)
  24. ^ estimates (www.brennancenter.org)
  25. ^ after the confusion of the 2000 election (www.americanprogress.org)
  26. ^ shutting down a Russian troll farm (thehill.com)
  27. ^ hacking attacks on election systems (www.symantec.com)
  28. ^ increased cybersecurity requirements (www.symantec.com)
  29. ^ paper ballots and analog vote-counting systems (www.ria.ee)
  30. ^ going back to paper ballots (repository.law.umich.edu)
  31. ^ 2019 court order (www.brookings.edu)
  32. ^ hand counted (theconversation.com)
  33. ^ Electoral Commission (www.aec.gov.au)
  34. ^ entire voting process (theconversation.com)
  35. ^ Australian Electoral Commission/Wikimedia Commons (en.wikipedia.org)
  36. ^ U.N. (www.un.org)
  37. ^ Paris Call for Trust and Security in Cyberspace (www.diplomatie.gouv.fr)
  38. ^ learn from other countries’ experiences (www.pymnts.com)
  39. ^ banning (www.washingtonpost.com)
  40. ^ risk-limiting audits (www.sos.state.co.us)
  41. ^ update its standards for voting machines (www.nist.gov)
  42. ^ National Cybersecurity Safety Board (phys.org)
  43. ^ Scholars (youtu.be)
  44. ^ You can get our highlights each weekend (theconversation.com)

Authors: Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Read more https://theconversation.com/us-could-learn-how-to-improve-election-protection-from-other-nations-126157

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more