{"id":4670,"date":"2016-10-05T16:30:22","date_gmt":"2016-10-05T20:30:22","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4670"},"modified":"2020-06-04T20:52:59","modified_gmt":"2020-06-04T20:52:59","slug":"russian-hackers-presidential-election","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/russian-hackers-presidential-election\/","title":{"rendered":"How I Learned to Stop Worrying and Love the Vote: Russian Hackers and Cybersecurity in the Presidential Election"},"content":{"rendered":"<p>As an already contentious election season draws into the homestretch, national security officials have <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/reuters\/2016\/10\/01\/us\/politics\/01reuters-usa-election-cyber.html\">detected hacking attempts<\/a><\/span> to at least <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/aponline\/2016\/09\/30\/us\/politics\/ap-us-election-hacking.html\">20 state voter registration systems<\/a><\/span>. And Russia could be to blame.<br \/>\nWith more states moving toward housing voter registration rolls online, the concern is that hackers could potentially gain access and delete voters in swing states in order to tip the scales toward a particular election outcome. Although voters could still cast provisional ballots if there is a discrepancy with their registration, this sort of <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/nation\/la-na-election-hacking-security-20160908-snap-story.html\">breech could cause chaos at the polls<\/a><\/span> with long lines and disgruntled voters. Secretary of Homeland Security Jeh Johnson assures the public that no evidence has been found of any manipulation of those voter registration systems.<br \/>\nThe FBI is investigating Russian hackers as the potential culprits of the activity. Leads include <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/09\/28\/world\/europe\/russia-hacker-vladimir-fomenko-king-servers.html?_r=0\">Vladimir Fomenko<\/a><\/span>, \u201cthe owner of a server rental company called <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.king-servers.com\/\">King Servers<\/a><\/span> used by hackers in an incursion on <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/edition.cnn.com\/2016\/08\/29\/politics\/hackers-breach-illinois-arizona-election-systems\/\">computerized election systems in Arizona and Illinois<\/a><\/span> this year.\u201d <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/reuters\/2016\/10\/02\/technology\/02reuters-usa-election-cyber.html?_r=0\">Multiple congressional leaders<\/a><\/span> have also pointed to Russia. The White House has yet to publicly accuse Russia for the attacks, but concerns over releasing classified information to support the accusation and Vladimir Putin\u2019s aggressive posturing towards public rebukes may explain the slow acknowledgment from the Obama administration.<br \/>\nAmid the hacking reports are renewed concerns that voting machines themselves may be at risk, leading to contested election results.<\/p>\n<blockquote><p>Fortunately, the nation\u2019s bulky and decentralized voting system actually adds a critical layer of protection against election manipulation.<\/p><\/blockquote>\n<p>The United States has over <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/nation\/la-na-election-hacking-security-20160908-snap-story.html\">8000 separate jurisdictions<\/a><\/span> in which voters cast ballots, and all of them use their own voting methods based on state and local rules. This means hacking the entire U.S. voting system is nearly literally impossible to penetrate much less to alter the results of the election.<br \/>\nEven so, FBI Director James Comey said, &#8220;We are urging the states just to make sure that their <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/aponline\/2016\/09\/28\/us\/politics\/ap-us-congress-election-hacking.html\">deadbolts are thrown<\/a><\/span> and their locks are on and to get the best information they can from [the Department of Homeland Security], just to make sure their systems are secure.\u201d<br \/>\nSome states have more to worry about than others. <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/reuters\/2016\/09\/20\/world\/europe\/20reuters-usa-election-machines.html\">One in four voters<\/a><\/span> live in a jurisdiction that does not have a paper backup system, which would allow states to conduct audits in a contested election. <a href=\"http:\/\/www.cbsnews.com\/news\/more-state-election-databases-hacked-than-previously-thought\/\"><span style=\"color: #0000ff\">CBS report<\/span>s<\/a>: \u201cFive states are completely paperless: Delaware, Georgia, Louisiana, New Jersey and South Carolina. Nine other states have some counties that use paperless systems: Arkansas, Indiana, Kansas, Kentucky, Mississippi, Pennsylvania, Tennessee, Texas and Virginia.\u201d Among that list, crucial <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.cbsnews.com\/news\/ex-nsa-expert-if-i-were-an-election-day-hacker-id-hit-pennsylvania\/\">swing states like Pennsylvania<\/a><\/span> cause the most concern.<br \/>\nProfessor Andrew Appel of Princeton University demonstrated how easily the digital voting machines, like the ones used in Pennsylvania, could be hacked. Appel and a student managed to modify a machine with their own computer chips that would throw off the machine\u2019s results in <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.politico.com\/magazine\/story\/2016\/08\/2016-elections-russia-hack-how-to-hack-an-election-in-seven-minutes-214144\">just seven minutes<\/a><\/span>. Appel and colleagues have been sounding the alarm for nearly 15 years, engaging in a series of stunts to spread a simple message: \u201cThat the machines that Americans use at the polls are less secure than the iPhones they use to navigate their way there.\u201d<br \/>\nTo minimize the risk of tampering at polling locations, the chief security officer of cybersecurity company Carbon Black <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.cbsnews.com\/news\/ex-nsa-expert-if-i-were-an-election-day-hacker-id-hit-pennsylvania\/\">Ben Johnson suggested<\/a><\/span> that election officials should:<\/p>\n<ul>\n<li><span style=\"color: #000000\">Keep individuals from having prolonged access to the physical voting machines;\u00a0<\/span><\/li>\n<li><span style=\"color: #000000\">Turn off any communications capacities, like Wi-Fi or Bluetooth, on the machines;<\/span><\/li>\n<li><span style=\"color: #000000\">Make sure no other devices\u00a0are plugged into the machines;<\/span><\/li>\n<li><span style=\"color: #000000\">And train polling\u00a0station workers, typically volunteers unfamiliar with cybersecurity, on the importance of\u00a0enforcing these measures.<\/span><\/li>\n<\/ul>\n<p>While the likelihood of a massive hacking operation on voting machines remains extremely improbable, the real risk is the potential <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/09\/15\/us\/politics\/sowing-doubt-is-seen-as-prime-danger-in-hacking-voting-system.html\">doubt sown in the American electorate<\/a><\/span>. With tensions high in this election, cyberattacks may cause voters to question the legitimacy of the results.<br \/>\nAccording to a report <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.carbonblack.com\/wp-content\/uploads\/2016\/09\/Carbon_Black_Democracy_at_Risk_September_2016.pdf\">\u201cDemocracy at Risk\u201d<\/a><\/span> by Carbon Black, \u201cmore than half (56%) of U.S. voters are concerned that this year\u2019s election will be affected by hacking\/cyber attack.\u201d The report estimates that more than 15 million voters may choose not to vote because of concerns over cybersecurity.<br \/>\nHopefully, these concerns about aging voting machines and vulnerable online systems will prompt a review of the nation\u2019s voting infrastructure and prompt the federal government to appropriate new funds to update state systems. Until then, voters might do well to opt for paper absentee ballots in those jurisdictions without a paper backup.<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an already contentious election season draws into the homestretch, national security officials have detected hacking attempts to at least 20 state voter registration systems. And Russia could be to blame. With more states moving toward housing voter registration rolls online, the concern is that hackers could potentially gain access and delete voters in swing <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/russian-hackers-presidential-election\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4670"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4670"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4670\/revisions"}],"predecessor-version":[{"id":7168,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4670\/revisions\/7168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4671"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}