Updated Jul 2, 2018 - Technology

There's more than one way to hack an election

Illustration: Lazaro Gamio/Axios

U.S. intelligence agencies concluded a long time ago (and the bipartisan Senate Intelligence Committee agreed) that Russia tried to meddle in the 2016 U.S. elections. But election-tampering can take many forms.

Reality check: The American election system is actually made up of 50 different state-run elections, and each state has several systems that are potentially vulnerable. Here’s what you need to know about exactly where our election systems are at risk.

The big picture: Per John Sebes, the CTO at the U.S. Open Source Election Technology Institute: “You really need to regard the attack surface as like Swiss cheese.”

Here are the systems at risk in the election process:

  • Voter registration systems
  • Voter registration databases (which the voter registration process produces)
  • Voter records at polling places (known as poll books, which exist in both printed and electronic versions)
  • Voting machines (which capture the votes)
  • Vote tabulation (when the votes are tallied)

This list doesn't include voter fraud, illegal efforts to influence votes, and problems with news, social media, and information surrounding elections.

The chief vulnerability: internet exposure

Many parts of election systems are at risk of being exposed to the internet — and thereby potentially being inappropriately accessed or meddled with — because of human error or bad security protocols.

Here are some of the main points of risk:

  • Registration interfaces: When people enter their voter registration information online, any vulnerability on users' devices could expose the information they enter to potential bad actors. (Only their individual data should be at risk.)
  • Voter registration databases: Security measures like firewalls and physical network separation can protect these data troves, but no firewall is foolproof.
  • Electronic poll books: E-poll books are the electronic version of the books of voter records that poll workers refer to on Election Day at voting locations. In some instances, e-poll books can send live updates back to the county or state offices using active network connections. If the security on those networks fails, the information could be exposed.
  • Printed poll books: Some counties print their poll books using third-party printers, according to Maurice Turner, the senior technologist at the Center for Democracy & Technology. That could expose this part of the process to the internet if the third party has bad security protocols or other vulnerabilities.
  • Voting machines: At DEFCON last year, hackers demonstrated that they could break in to any voting machine with wireless connectivity or a USB port.
    • In theory, it would be very difficult to exploit the vulnerabilities physically, because someone would likely notice this kind of tampering. (But it's not unusual for people to take their time in a voting booth, and election officials can't and shouldn't observe every single move that voters make.)
  • Electronic vote tabulation: This can require data from electronic ballots to be transferred to an Election Management System (EMS). Any of the methods used to do that — USB sticks, email, or other internet transfer — can expose the data to tampering if not properly secured.
  • Optical scan vote tabulation: Scanners often tabulate paper records of votes, like a standardized test. But in some cases, these scanners may be rented from third-party vendors, which means they might have been exposed to tampering or bad security there.
  • Election management systems: These systems, used in different locales to tabulate and store voting results, may be at risk of exposure to the internet as well, depending on the jurisdiction's security protocols.

Absence of paper trails: Most of these vulnerabilities are deepened by the lack of paper backups to electronic election systems. In five states there is no paper records of votes, and in nine others the paper record is spotty.

Risks from human error, confusion, and doubt

Any time a human being interacts with a device or a system, things can go wrong.

  • For example, if workers improperly mark that a voter appeared at a polling location, officials could end up with a discrepancy between the tally of total voters who showed up on Election Day and the tally of total number of votes cast.

Why it matters: Mistakes introduced through human error — as when people enter voter registration information incorrectly, or election officials input the wrong numbers by accident — aren't likely to affect an election outcome if they happen at a small scale. But they can add to the confusion in the context of other simultaneous efforts to undermine public trust in elections or to create chaos.

  • And if Russia or another adversary can still claim responsibility for any cascade of errors even if it had no part in them. This tactic — experts call it a "blended attack" — can cause just as much disruption to the elections and cast just as much doubt on their results as more direct interference could.
  • Remember: Most of what the Russians did with regard to election systems in 2016 was probe voter registration records — as far as we know, they didn't change registration records or vote tallies — and that still sparked a national debate.
Be smart

Any vulnerability can be exploited in ways that reduce public trust in elections, and if that's the goal of an adversary like, say, Russia, then the system's credibility could be weakened even if tampering hasn't promoted a particular winner or loser.

Go deeper

Editor's note: This story has been corrected to remove references, in the voting machines section, to breaking into the machines within 90 minutes and to accessing them over the internet.

What's next

Bolton alleges in book that Trump tied Ukraine aid to investigations

Photo: Alex Wong/Getty Images

President Trump's former national security adviser John Bolton alleges in his forthcoming book that the president explicitly told him "he wanted to continue freezing $391 million in security assistance to Ukraine until officials there helped with investigations into Democrats including the Bidens," the New York Times first reported.

Why this matters: The revelations present a dramatic 11th hour turn in Trump's Senate impeachment trial. They directly contradict Trump's claim that he never tied the hold-up of Ukrainian aid to his demands for investigations into his political opponent Joe Biden.

Honoring Kobe Bryant: Sports stars, politicians and celebrities mourn NBA great

Kobe Bryant on court for the Los Angeles Lakers during the Sprite Slam Dunk Contest on All-Star Saturday Night, part of 2010 NBA All-Star Weekend at American Airlines Center in Dallas in February 2010. Photo: Jed Jacobsohn/Getty Images

Sports stars, politicians and celebrities paid tribute to NBA legend Kobe Bryant, who was killed in a California helicopter crash alongside his 13-year-old daughter, Gianna, and seven others on Saturday. He was 41.

What they're saying: Lakers great Shaquille O'Neal said in an Instagram post of his former teammate, "There's no words to express the pain I'm going through now with this tragic and sad moment of losing my friend, my brother, my partner in winning championships, my dude and my homie. I love you brother and you will be missed."

Go deeperArrow3 hours ago - Sports

What's next: Trump's broader travel ban

A sign for International Arrivals is shown at the Seattle-Tacoma International Airport. Photo: Ted S. Warren/AP

President Trump is expected to announce an expanded travel ban this week, which would restrict immigration from seven additional countries — Nigeria, Myanmar, Sudan, Belarus, Eritrea, Kyrgyzstan and Tanzania, per multiple reports.

  • The announcement would come on the third anniversary of Trump's original travel ban, which targeted Muslim-majority nations, per Axios' Stef Kight.